00:00

QUESTION 11

Which of the following protocols cannot be used to filter VoIP traffic?

Correct Answer: D

QUESTION 12

TCP/IP provides a broad range of communication protocols for the various applications on the network. The TCP/IP model has four layers with major protocols included within each layer. Which one of the following protocols is used to collect information from all the network devices?

Correct Answer: A

QUESTION 13

Which one of the following tools of trade is a commercial shellcode and payload generator written in Python by Dave Aitel?

Correct Answer: C

QUESTION 14

Larry is an IT consultant who works for corporations and government agencies. Larry plans on shutting down the city's network using BGP devices and Zombies? What type of Penetration Testing is Larry planning to carry out?

Correct Answer: C

QUESTION 15

Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests. What type of scan is Jessica going to perform?

Correct Answer: D