Which of the following protocols cannot be used to filter VoIP traffic?
Correct Answer:
D
TCP/IP provides a broad range of communication protocols for the various applications on the network. The TCP/IP model has four layers with major protocols included within each layer. Which one of the following protocols is used to collect information from all the network devices?
Correct Answer:
A
Which one of the following tools of trade is a commercial shellcode and payload generator written in Python by Dave Aitel?
Correct Answer:
C
Larry is an IT consultant who works for corporations and government agencies. Larry plans on shutting down the city's network using BGP devices and Zombies? What type of Penetration Testing is Larry planning to carry out?
Correct Answer:
C
Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests. What type of scan is Jessica going to perform?
Correct Answer:
D