Question 216
Adam works as a Network administrator for Umbrella Inc. He noticed that an ICMP ECHO requests is coming from some suspected outside sources. Adam suspects that some malicious hacker is trying to perform ping sweep attack on the network of the company. To stop this malicious activity, Adam blocks the ICMP ECHO request from any outside sources.
What will be the effect of the action taken by Adam?
What will be the effect of the action taken by Adam?
Question 217
You see the career section of a company's Web site and analyze the job profile requirements. You conclude that the company wants professionals who have a sharp knowledge of Windows server 2003 and Windows active directory installation and placement. Which of the following steps are you using to perform hacking?
Question 218
Adam works as a Security Analyst for Umbrella Inc. CEO of the company ordered him to implement two-factor authentication for the employees to access their networks. He has told him that he would like to use some type of hardware device in tandem with a security or identifying pin number. Adam decides to implement smart cards but they are not cost effective.
Which of the following types of hardware devices will Adam use to implement two-factor authentication?
Which of the following types of hardware devices will Adam use to implement two-factor authentication?
Question 219
Which of the following threats is a combination of worm, virus, and Trojan horse characteristics?
Question 220
John works as a Professional Ethical Hacker for NetPerfect Inc. The company has a Linux-based network. All client
computers are running on Red Hat 7.0 Linux. The Sales Manager of the company complains to John that his system
contains an unknown package named as tar.gz and his documents are exploited. To resolve the problem, John uses a
Port scanner to enquire about the open ports and finds out that the HTTP server service port on 27374 is open. He
suspects that the other computers on the network are also facing the same problem. John discovers that a malicious
application is using the synscan tool to randomly generate IP addresses.
Which of the following worms has attacked the computer?
computers are running on Red Hat 7.0 Linux. The Sales Manager of the company complains to John that his system
contains an unknown package named as tar.gz and his documents are exploited. To resolve the problem, John uses a
Port scanner to enquire about the open ports and finds out that the HTTP server service port on 27374 is open. He
suspects that the other computers on the network are also facing the same problem. John discovers that a malicious
application is using the synscan tool to randomly generate IP addresses.
Which of the following worms has attacked the computer?