Which of the following statements are true about an IPv6 network?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:
ABCD
Which of the following are well-known ports?
Each correct answer represents a complete solution. Choose two.
Correct Answer:
AB
Which of the following password cracking attacks is implemented by calculating all the possible hashes for a set of characters?
Correct Answer:
C
An attacker makes an attempt against a Web server. The result is that the attack takes the form of URLs. These URLs search for a certain string that identifies an attack against the Web server.
Which IDS/IPS detection method do the URLs use to detect and prevent an attack?
Correct Answer:
D
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based routed network. You have recently come to know about the Slammer worm, which attacked computers in 2003 and doubled the number of infected hosts every 9 seconds or so. Slammer infected 75000 hosts in the first 10 minutes of the attack. To mitigate such security threats, you want to configure security tools on the network. Which of the following tools will you use?
Correct Answer:
A