tutorialpoint.org

Engg. tutorials

  • Instrumentation and Control Lab
  • Control systems assignment
  • Shape memory alloy SMA actuator
  • Dielectric elastomer
  • EM theory lecture notes
  • GATE question papers
  • JAM question papers
  • Kalman filter tutorial
  • Nonlinear estimation
  • Certified Ethical Hacker (CEHv9) Questions and answers

    87. During a recent security assessment, you discover the organization has one Domain Name Server (DNS) in a Demilitarized Zone (DMZ) and a second DNS server on the internal network. What is this type of DNS configuration commonly called?

    A. DNSSEC

    B. Split DNS

    C. DynDNS

    D. DNS Scheme



    88. You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has snort installed, and the second machine (192.168.0.150) has kiwi syslog installed. You perform a syn scan in your network, and you notice that kiwi syslog is not receiving the alert message from snort. You decide to run wireshark in the snort machine to check if the messages are going to the kiwi syslog machine. What wireshark filter will show the connections from the snort machine to kiwi syslog machine?

    A. tcp.srcport==514 && ip.src-192.168.150

    B. tcp.dstport==514 &&ip.dst==192.168.0.0/16

    C. tcp.dstport==514 &&ip.dst==192.168.0.150

    D. tcp.srcport==514 && ip.src-192.168.0.99



    < Prev.Page             CEHv9 Home             Next page>