In which of the following processes, a DNS server may return an incorrect IP address, diverting traffic to another computer?
An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?
Which of the following attacks involves multiple compromised systems to attack a single target?
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. While examining a log report, he finds that an intrusion has been attempted by an attacker whose IP address is 0x40.0x3A.0x2B.0xE6. Which of the following decimal IP addresses will respond to the ping on the above Hexadecimal IP address?
John works as a Network Security Professional. He is assigned a project to test the security of www.we-are-secure.com. He is working on the Linux operating system and wants to install an Intrusion Detection System on the We-are-secure server so that he can receive alerts about any hacking attempts. Which of the following tools can John use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following hashing algorithms produces a variable length hash value?
Which of the following terms refers to the method that allows or restricts specific types of packets from crossing over the firewall?
Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use?
Each correct answer represents a complete solution. Choose two.
You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?
Which of the following are examples of passive attacks?
Each correct answer represents a complete solution. Choose all that apply.