In order to perform promiscuous mode captures using the Wireshark capture tool on a Windows Server
2003 machine, what must first be installed?
In your organization a decision has been made to implement a multicasting application. You are configuring your firewall to allow this application to flow through in both directions. What address range are you going to address on the firewall?
You are configuring the rules on your firewall, and need to take into consideration that some clients in the
network are using automatic addressing. What is the IP address range reserved for internal use for APIPA in Microsoft networks?
You are working on your companys IPTables Firewall; you wish to create a rule to address traffic using ports 1024 through 2048. Which of the following would you use during the creation of your rule?
You have been given the task of building the new wireless networks for your office. What wireless standard allows for up to 54 Mbps transmission rates, but is not compatible with 802.11b?
You suspect an increase in malicious traffic on your network. You run several packet captures to analyze traffic patterns and look for signs of intruders. While studying the packets, you are currently looking for ICMP Messages. You choose to use the IP Protocol ID to locate different kinds of packets. What is the IP Protocol ID of ICMP?
You are introducing a co-worker to the security systems in place in your organization. During the discussion you begin talking about the network, and how it is implemented. You decide to run a packet capture to identify different aspects of network traffic for your co-worker. In the packet capture you are able to identify Protocol IDs. What is the IP protocol ID for TCP?
After you implemented your IPSec solution, you wish to run some tests to verify functionality. Which of the following provides confidentiality and authentication when implementing IPSec?