Question 25

Which of the following tools is a wireless sniffer and analyzer that works on the Windows operating system?

Correct Answer:A

Question 26

Victor wants to send an encrypted message to his friend. He is using certain steganography technique to accomplish this task. He takes a cover object and changes it accordingly to hide information. This secret information is recovered only when the algorithm compares the changed cover with the original cover. Which of the following Steganography methods is Victor using to accomplish the task?

Correct Answer:A

Question 27

You work as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network contains Windows Server 2008 based two-node Network Load Balancing (NLB) cluster named Info.nettech.com. The cluster is implemented for high availability and load balancing for the company's intranet Web site. You find that the users can see the Network Load Balancing (NLB) cluster on the network neighborhood. The users are able to connect to various services by using the Info.nettech.com. The cluster is configured with the one port rule that equally balances all TCP/IP traffic across the cluster nodes. You want to configure the cluster to accept only HTTP traffic. What will you do to accomplish the task?
Each correct answer represents a part of the solution. Choose two.

Correct Answer:CD

Question 28

Which of the following techniques is used to log network traffic?

Correct Answer:D

Question 29

What is the order of the extension headers that is followed by IPv6?

Correct Answer:D

Question 30

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server. Which of the following tools will John use to accomplish his task?

Correct Answer:C

START GCIA EXAM