Which of the following types of IP actions are supported by an IDP rulebase? (Choose three.)
Which of the following firewalls operates at three layers - Layer3, Layer4, and Layer5?
Which of the following hexadecimal values in the boot field in the configuration register loads the first IOS file found in Flash memory?
Jain works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.abc.com.He has successfully completed the following steps of the preattack phase:>> Information gathering>> Determining network range>> Identifying active machines>> Finding open ports and applications>> OS fingerprinting>> Fingerprinting servicesNow Jain wants to perform network mapping of the ABC network.Which of the following tools can he use to accomplish his task?Each correct answer represents a complete solution. (Choose all that apply.)
Which of the following tools allows an attacker to intentionally craft the packets to gain unauthorized access?Each correct answer represents a complete solution. (Choose two.)
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.abc.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:It is a Unix-based WLAN WEP cracking tool that recovers encryption keys. It operates by passively monitoring transmissions. It uses Chipertext Only Attack and captures approximately 5 to 10 million packets to decrypt the WEP keys.Which of the following tools is John using to crack the wireless encryption keys?