Question 21
Kyle, a front office executive, suspects that a Trojan has infected his computer. What should be his first course of action to deal with the incident?
Question 22
You work as a Network Security Analyzer. You got a suspicious email while working on a forensic project. Now,
you want to know the IP address of the sender so that you can analyze various information such as the actual
location, domain information, operating system being used, contact information, etc. of the email sender with
the help of various tools and resources. You also want to check whether this email is fake or real. You know
that analysis of email headers is a good starting point in such cases. The email header of the suspicious email
is given below:

What is the IP address of the sender of this email?
you want to know the IP address of the sender so that you can analyze various information such as the actual
location, domain information, operating system being used, contact information, etc. of the email sender with
the help of various tools and resources. You also want to check whether this email is fake or real. You know
that analysis of email headers is a good starting point in such cases. The email header of the suspicious email
is given below:

What is the IP address of the sender of this email?
Question 23
Which of the following IP class addresses are not allotted to hosts?Each correct answer represents a complete solution. Choose all that apply.
Question 24
Which of the following protocols supports source-specific multicast (SSM)?
Question 25
Which of the following examines network traffic to identify threats that generate unusual traffic flows, such as distributed denial of service (DDoS) attacks, certain forms of malware, and policy violations?
