Which of the following tools is used to detect round-robin-load-balancing?
Correct Answer:D
Which of the following tools is used to detect wireless LANs using the 802.11b, 802.11a, and 802.11g WLAN standards on the Windows platform?
Correct Answer:C
Which of the following attacks is used to hack simple alphabetical passwords?
Correct Answer:A
Which of the following is NOT the primary type of firewall?
Correct Answer:A
John works as a Security Administrator for NetPerfect Inc. The company uses Windows-based systems. A project has been assigned to John to track malicious hackers and to strengthen the company's security system. John configures a computer system to trick malicious hackers into thinking that it is the company's main server, which in fact is a decoy system to track hackers.
Which system is John using to track the malicious hackers?
Correct Answer:A
Which of the following commands used in Linux to create bit-stream images?
Correct Answer:C