00:00

QUESTION 61

- (Topic 2)
You are concerned about rogue wireless access points being connected to your network. What is the best way to detect and prevent these?

Correct Answer: A

QUESTION 62

- (Topic 4)
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully performed the following steps of the preattack phase to check the security of the We-are-secure network:
Gathering information
Determining the network range
Identifying active systems
Now, he wants to find the open ports and applications running on the network. Which of the following tools will he use to accomplish his task?

Correct Answer: B

QUESTION 63

- (Topic 4)
Which of the following wireless security standards supported by Windows Vista provides the highest level of security?

Correct Answer: A

QUESTION 64

- (Topic 3)
You want to search the Apache Web server having version 2.0 using google hacking. Which of the following search queries will you use?

Correct Answer: A

QUESTION 65

- (Topic 2)
Which of the following is a tool for SSH and SSL MITM attacks?

Correct Answer: C