Question 21

Kyle, a front office executive, suspects that a Trojan has infected his computer. What should be his first course of action to deal with the incident?
  • Question 22

    You work as a Network Security Analyzer. You got a suspicious email while working on a forensic project. Now,
    you want to know the IP address of the sender so that you can analyze various information such as the actual
    location, domain information, operating system being used, contact information, etc. of the email sender with
    the help of various tools and resources. You also want to check whether this email is fake or real. You know
    that analysis of email headers is a good starting point in such cases. The email header of the suspicious email
    is given below:

    What is the IP address of the sender of this email?
  • Question 23

    Which of the following IP class addresses are not allotted to hosts?Each correct answer represents a complete solution. Choose all that apply.
  • Question 24

    Which of the following protocols supports source-specific multicast (SSM)?
  • Question 25

    Which of the following examines network traffic to identify threats that generate unusual traffic flows, such as distributed denial of service (DDoS) attacks, certain forms of malware, and policy violations?