John works as the Security Manager for PassGuide Inc. He wants to create the Profiler database that stores information about the network activity at Layer 3, Layer 4, and Layer 7.
Which of the following will he use to accomplish the task?
Each correct answer represents a complete solution. (Choose all that apply.)
A. Session creation
B. Ignore connection
C. Protocol contexts
D. Session teardown
正解:A,C,D
質問 2:
Which of the following command-line utilities is used to show the state of current TCP/IP connections?
A. NETSTAT
B. TRACERT
C. PING
D. NSLOOKUP
正解:A
質問 3:
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully performed the following steps of the preattack phase to check the security of the We-are-secure network:
* Gathering information
* Determining the network range
* Identifying active systems
Now, he wants to find the open ports and applications running on the network.
Which of the following tools will he use to accomplish his task?
A. APNIC
B. SuperScan
C. RIPE
D. ARIN
正解:B
質問 4:
A packet filtering firewall inspects each packet passing through the network and accepts or rejects it based on user-defined rules.
Based on which of the following information are these rules set to filter the packets?
Each correct answer represents a complete solution. (Choose all that apply.)
A. Interface of sent or received traffic
B. Layer 4 protocol information
C. Actual data in the packet
D. Source and destination Layer 3 address
正解:A,B,D
質問 5:
You work as a technician for ABC Inc. You are troubleshooting a connectivity issue on a network. You are using the ping command to verify the connectivity between two hosts. You want ping to send larger sized packets than the usual 32-byte ones.
Which of the following commands will you use?
A. ping -l
B. ping -t
C. ping -a
D. ping -4
正解:A
Sakaguchi -
間違い選択肢についても確認できる。
いろいろ問題集が出てますが、圧倒的に良いと思います。