You work as a Network Administrator for XYZ CORP. The company has a Linux-based network. The company needs to provide secure network access. You have configured a firewall to prevent certain ports and applications from forwarding the packets to the company's intranet.What does a firewall check to prevent these ports and applications from forwarding the packets to the intranet?
You work as the Network Administrator for XYZ CORP. The company has a Unix-based network. You want to print the super block and block the group information for the filesystem present on a system.Which of the following Unix commands can you use to accomplish the task?
Which of the following responsibilities does not come under the audit process?
TCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote device during standard layer 4 network communications. The combination of parameters may then be used to infer the remote operating system (OS fingerprinting), or incorporated into a device fingerprint.Which of the following Nmap switches can be used to perform TCP/IP stack fingerprinting?
Which of the following allows the use of multiple virtual servers using different DNS names resolved by the same IP address?
Which of the following statements about a screened host is true?