Question 73

Which of the following tools is used to detect round-robin-load-balancing?

Correct Answer:D

Question 74

Which of the following tools is used to detect wireless LANs using the 802.11b, 802.11a, and 802.11g WLAN standards on the Windows platform?

Correct Answer:C

Question 75

Which of the following attacks is used to hack simple alphabetical passwords?

Correct Answer:A

Question 76

Which of the following is NOT the primary type of firewall?

Correct Answer:A

Question 77

John works as a Security Administrator for NetPerfect Inc. The company uses Windows-based systems. A project has been assigned to John to track malicious hackers and to strengthen the company's security system. John configures a computer system to trick malicious hackers into thinking that it is the company's main server, which in fact is a decoy system to track hackers.
Which system is John using to track the malicious hackers?

Correct Answer:A

Question 78

Which of the following commands used in Linux to create bit-stream images?

Correct Answer:C

START GCIA EXAM