Which of the following proxy servers is placed anonymously between the client and remote server and handles all of the traffic from the client?
Which of the following protocols does IPsec use to perform various security functions in the network?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following well-known ports is used by BOOTP?
Which of the following is a valid IPv6 address?
Which of the following types of Intrusion Detection Systems consists of an agent on a host that identifies intrusions by analyzing system calls, application logs, file-system modifications (binaries, password files, capability/acl databases) and other host activities and state?
Which of the following devices is used to identify out-of-date software versions, applicable patches, system upgrades, etc?
Which of the following forms on NAT maps multiple unregistered IP addresses to a single registered IP address by using different ports?
Which of the following number ranges is used for the IP Standard ACL?
You work as a Network Administrator for Tech Perfect Inc. You are required to verify security policies configured in the company's networks. Which of the following applications will you use to accomplish the task?
You have just taken over as the Network Administrator for a medium sized company. You want to check to see what services are exposed to the outside world. What tool would you use to accomplish this?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
GIAC Free Exams |
---|
![]() |