Which of the following components are used in the implementation of a wireless intrusion prevention system?
Each correct answer represents a part of the solution. Choose three.
You are tasked with configuring your routers with a minimum security standard that includes the following:
l A local Username and Password configured on the router
l A strong privilege mode password
l Encryption of user passwords
l Configuring telnet and ssh to authenticate against the router user database
Choose the configuration that best meets these requirements.
You work as a System Administrator for McNeil Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. Your network is configured for IPv6 IP addressing. Which of the following commands will you use to test TCP/IP connectivity?
Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65,536 bytes.
On the basis of above information, which of the following types of attack is Adam attempting to perform?
Sam works as a Security Manager for Gentech Inc. The company has a Windows-based network. Sam wants to prevent specific traffic from IDP processing in order to reduce false positives. Which of the following rulebases will he use to accomplish the task?
The simplest form of a firewall is a packet filtering firewall. Typically a router works as a packet-filtering firewall and has the capability to filter on some of the contents of packets. On which of the following layers of the OSI reference model do these routers filter information?
Each correct answer represents a complete solution. Choose all that apply.
You are the Administrator for a corporate network. You are concerned about denial of service attacks.
Which of the following would be most helpful against Denial of Service (DOS) attacks?
Distributed Checksum Clearinghouse (DCC) is a hash sharing method of spam email detection.
Which of the following protocols does the DCC use?
An organization has more than a couple of external business, and exchanges dynamic routing information with the external business partners. The organization wants to terminate all routing from a partner at an edge router, preferably receiving only summary routes from the partner. Which of the following will be used to change all partner addresses on traffic into a range of locally assigned addresses?
John works as a Security Manager for Gentech Inc. The company has a Windows-based network.
John has been assigned a project to detect the services used by an attack to access the network.
For this purpose, he is required to use the predefined service objects of the rulebase. This predefined service object defines the services used in the attack to access the network. Which of the following objects will he create when he finds that the attack is not defined in the predefined service objects?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
GIAC Free Exams |
---|
![]() |