Escolar Documentos
Profissional Documentos
Cultura Documentos
Reconnaissance
Scanning
Gaining Access
Maintaining Access
Clearing Track
True
False
Maintaining Access
Maintaining Access
NULL scan
IDLE scan
Maintaining Access
SNMP enumeration
NTP enumeration
SMTP enumeration
Substitution techniques
Stealth/Tunneling virus
Cluster virus
Macro virus
Switch
Router
Hub
Bridge
802.11a
802.11b
802.11g
802.11i
21. Which device in a wireless local area network (WLAN)
determines the next network point to which a packet should be
forwarded toward its destination?
Wireless modem
Antenna
Wireless router
Mobile station
Omnidirectional antenna
Yagi antenna
Dipole antenna
1,000 packets
5,000 packets
10,000 packets
15,000 packets
24. Firewall is a set of related programs, located at a network
gateway server that protects the resources of a private network
from users from other networks. A firewall examines all traffic
routed between the two networks to see if it meets certain
criteria.
Packet filter is one of the categories of firewall.
Packet filtering firewall works at which of these layers of the OSI
model?
Network layer
Physical layer
Session layer
Application layer
25. Keystroke loggers are stealth software packages that are used
to monitor keyboard activities. Which is the best location to place
such keyloggers?
Social Engineering
Buffer overflow
Denial of Service
SQL injection
27. Firewalls are categorized into two; namely hardware firewall
and software firewall. Identify the correct statement for a software
firewall.
ACK Scan
SYN Stealth
Half open
Windows Scan
Session Hijacking
Buffer overflow
30. Which of the following protocols are susceptible to sniffing?
SNMP
FTP
NNTP
Telnet