00:00

QUESTION 26

Which of the following describes network traffic that originates from the inside of a network perimeter and progresses towards the outside?

Correct Answer: C

QUESTION 27

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He finds that the We-are-secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against __________.

Correct Answer: A

QUESTION 28

Firewalking is a technique that can be used to gather information about a remote network protected by a firewall. This technique can be used effectively to perform information gathering attacks. In this technique, an attacker sends a crafted packet with a TTL value that is set to expire one hop past the firewall. Which of the following are pre-requisites for an attacker to conduct firewalking?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer: ABD

QUESTION 29

You have forgotten your password of an online shop. The web application of that online shop asks you to enter your email so that they can send you a new password. You enter your email
you@gmail.com
And press the submit button.
The Web application displays the server error. What can be the reason of the error?

Correct Answer: A

QUESTION 30

Which of the following protocol loggers is used to detect ping sweep?

Correct Answer: D