00:00

QUESTION 71

Which of the following tools are used to determine the hop counts of an IP packet?
Each correct answer represents a complete solution. Choose two.

Correct Answer: AB

QUESTION 72

Which of the following activities will you use to retrieve user names, and info on groups, shares, and services of networked computers?

Correct Answer: D

QUESTION 73

You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008- based network. You have created a test domain for testing IPv6 addressing. Which of the following types of addresses are supported by IPv6?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer: ABD

QUESTION 74

Allen works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a computer, which is used by the suspect to sexually harass the victim using instant messenger program. Suspect's computer runs on Windows operating system. Allen wants to recover password from instant messenger program, which suspect is using, to collect the evidence of the crime. Allen is using Helix Live for this purpose. Which of the following utilities of Helix will he use to accomplish the task?

Correct Answer: D

QUESTION 75

Which of the following statements about Secure Shell (SSH) are true?
Each correct answer represents a complete solution. Choose three.

Correct Answer: BCD