Which of the following types of firewall functions by creating two different communications, one between the client and the firewall, and the other between the firewall and the end server?
You have just taken over as the Network Administrator for a medium sized company. You want to check to see what services are exposed to the outside world.
What tool would you use to accomplish this?
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to send malicious data packets in such a manner that one packet fragment overlaps data from a previous fragment so that he can perform IDS evasion on the We-are-secure server and execute malicious data.
Which of the following tools can he use to accomplish the task?
Which of the following is used to provide hook handling facility within the Linux kernel in order to capture and manipulate network packets?
You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it.
By default, which of the following standard ports does the SSH protocol use for connection?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
GIAC Free Exams |
---|
![]() |