Which of the following protocols is used for destination and error reporting functions in datagram processing?
Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration.
The tool uses raw IP packets to determine the following:
• What ports are open on our network systems
• What hosts are available on the network
• Identify unauthorized wireless access points
• What services (application name and version) those hosts are offering
• What operating systems (and OS versions) they are running
• What type of packet filters/firewalls are in use
Which of the following tools is Victor using?
You configure a wireless router at your home. To secure your home Wireless LAN (WLAN), you implement WEP. Now you want to connect your client computer to the WLAN. Which of the following is the required information that you will need to configure the client computer?
Each correct answer represents a part of the solution. Choose two.
Which of the following is a process of monitoring data packets that travel across a network?
Which of the following is a software testing method that uses an internal perspective of the system to design test cases based on the internal structure?
In which of the following attacking methods does an attacker distribute incorrect IP address?
Which type of repudiation states that the creator of the message denies ever creating the message even after creating it?