00:00

QUESTION 26

Which of the following statements are true about an IPv6 network?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer: ABCD

QUESTION 27

Which of the following are well-known ports?
Each correct answer represents a complete solution. Choose two.

Correct Answer: AB

QUESTION 28

Which of the following password cracking attacks is implemented by calculating all the possible hashes for a set of characters?

Correct Answer: C

QUESTION 29

An attacker makes an attempt against a Web server. The result is that the attack takes the form of URLs. These URLs search for a certain string that identifies an attack against the Web server.
Which IDS/IPS detection method do the URLs use to detect and prevent an attack?

Correct Answer: D

QUESTION 30

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based routed network. You have recently come to know about the Slammer worm, which attacked computers in 2003 and doubled the number of infected hosts every 9 seconds or so. Slammer infected 75000 hosts in the first 10 minutes of the attack. To mitigate such security threats, you want to configure security tools on the network. Which of the following tools will you use?

Correct Answer: A