tutorialpoint.org

Engg. tutorials

  • Instrumentation and Control Lab
  • Control systems assignment
  • Shape memory alloy SMA actuator
  • Dielectric elastomer
  • EM theory lecture notes
  • GATE question papers
  • JAM question papers
  • Kalman filter tutorial
  • Nonlinear estimation
  • Certified Ethical Hacker (CEHv9) Questions and answers

    19. The configuration allows a wired or wireless network interface controller to pass all traffic it receives to the central processing unit (CPU), rather than passing only the frames that the controller is intended to receive. Which of the following is being described?

    A. port forwarding

    B. WEM

    C. promiscuous mode

    D. multi-cast mode



    20. You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration? Alert try any any 192.168.100.0/24 21 (msg: "FTP on the network!";)

    A. An Intrusion Detection System

    B. A firewall IPTable

    C. A Router IPTable

    D. FTP Server rule



    < Prev.Page             CEHv9 Home             Next page>