00:00

QUESTION 91

- (Topic 2)
John works as a professional Ethical Hacker. He has been assigned a project to test the
security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server. Which of the following tools will John use to accomplish his task?

Correct Answer: B

QUESTION 92

- (Topic 2)
Which of the following is an information gathering technique that is used to identify risks?

Correct Answer: D

QUESTION 93

- (Topic 2)
Sam works as a Web Developer for McRobert Inc. He wants to control the way in which a Web browser receives information and downloads content from Web sites. Which of the following browser settings will Sam use to accomplish this?

Correct Answer: C

QUESTION 94

- (Topic 2)
Which of the following U.S.C. laws is governs the fraudulent activities associated with computers?

Correct Answer: D

QUESTION 95

- (Topic 1)
A Cisco Unified Wireless Network has an AP that does not rely on the central control device of the network. Which type of AP has this characteristic?

Correct Answer: D