Which of the following is a Cisco IOS management term described in the statement below?
"It is the fourth digit in the configuration register and contains a hexadecimal value. The bootstrap program uses its value to choose which operating system to load into RAM".
Which of the following devices are used to implement Network Address Translation (NAT)?
Which of the following actions can be taken as the countermeasures against the ARP spoofing attack?
Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following IPv4 to IPv6 transition methods uses encapsulation of IPv6 packets to traverse IPv4 networks?
Which of the following ports cannot be used to access the router from a computer?
Passive OS fingerprinting (POSFP) is configured in an organization's network in order to improve the alert output by reporting some information.
Which of the following information does it include?
Each correct answer represents a part of the solution. (Choose all that apply.)
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?
In which of the following IDS evasion techniques does an attacker deliver data in multiple small sized packets, which makes it very difficult for an IDS to detect the attack signatures of such attacks?
Which of the following algorithms is used as a default algorithm for ESP extension header in IPv6?
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server.
Which of the following tools will John use to accomplish his task?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
GIAC Free Exams |
---|
![]() |