Which of the following ports is used by e-mail clients to send request to connect to the server?
Correct Answer:D
Victor is a novice Ethical Hacker. He is learning the hacking process, i.e., the steps taken by malicious hackers to perform hacking. Which of the following steps is NOT included in the hacking process?
Correct Answer:A
Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?
Each correct answer represents a complete solution. Choose two.
Correct Answer:BD
Which of the following proxy servers is also referred to as transparent proxies or forced proxies?
Correct Answer:D
Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?
Correct Answer:C
You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based network. The network is connected to the Internet through a firewall. A user complains that he is unable to access the abc.com site. However, he can access all other sites. Which of the following tools will help you diagnose the problem?
Correct Answer:D