题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-12-11 05:55:38

[单项选择]Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()
A. denial of service
B. brute force
C. reconnaissance
D. Trojan horse

更多"Which type of attack is characteriz"的相关试题:

[单项选择]Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server()。
A. denial of service
B. brute force
C. reconnaissance
D. Trojan horse
[单项选择]Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()
A. denial of service
B. brute force
C. reconnaissance
D. Trojan horse
[单项选择]Which of these technologies is characterized as being a multipoint Layer 2 VPN that connects two or more customer devices using Ethernet bridging techniques?()
A. DPT
B. MPLS
C. VPLS
D. CWDM
E. DWDM
F. SONET/SDH
[单项选择]Which interface type connects the control and forwarding planes on an MX Series device?()
A. fxp1
B. fxp0
C. me0
D. ae1
[单项选择]Under which network type circumstance would an OSPF router establish router adjacencies while not performing the DR/BDR election process?()
A. Point-to-point
B. Broadcast
C. Non-broadcast multi-access
D. Backbone area 0
E. None of the above
[单项选择]Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()
A. IETF
B. HDLC
C. Q9333-A Annex A
D. ANSI Annex D
[单项选择]Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server?()
A. denial of service
B. brute force
C. reconnaissance
D. Trojan horse 
[单项选择]Which encryption type is used to secure user data in an IPsec tunnel?()
A. symmetric key encryption
B. asymmetric key encryption
C. RSA
D. digital certificates
[单项选择]Which packet type is used to ackno wledge LSPs on point - to - point links and to request missing pieces of information in the IS - IS link -state database?()
A. complete SNP (CSNP)
B. partial SNP (PSNP)
C. hello
D. database query
E. database description packet (DDP)
[单项选择]Which zone type will allow transit-traffic?()
A. system
B. security
C. default
D. functional
[单项选择]A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()
A. All traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewable
B. Clients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patterns
C. All traffic is redirected to the VLAN that the attacker used to flood the CAM table
D. All traffic is flooded out all ports and an attacker is able to capture all data
E. None of the other alternatives apply
[单项选择]Which zone type can be specified in a policy?()
A. security
B. functional
C. user
D. system
[单项选择]The ______ of the flood, which caused thousands of people to lose their houses, was 3 weeks of torrential min.
A. source
B. origin
C. root
D. resource
[单项选择]Which router translates the Type 7 LSAs into Type 5 LSAs, according to RFC 1587 (OSPF NSSAOption) in an OSPF NSSA with more than one ABR?()
A. The router receiving the route translates the Type 7 LSA into a Type 5 LSA.
B. The ABR with the lowest router ID translates all Type 7 LSAs into Type 5 LSAs.
C. The ABR with the highest router ID translates all Type 7 LSAs into Type 5 LSAs.
D. All ABRs translate the Type 7 LSAs into Type 5 LSAs depending on which one has the lowest cost to the route.
[单项选择]Which type of traffic will cause Policed Discards errors on an interface on a JUNOS device?()
A. Traffic that does not match any route in the forwarding table.
B. Traffic that exceeds the bandwidth of the interface.
C. Traffic of unsupported protocols on that interface.
D. Traffic arriving on unknown virtual-circuits on that interface.
[单项选择]Which type of deployment utilizes ISRs with Cisco IOS Security feature sets to provide an ideal, low-cost, yet capable and powerful platform?()
A. Small deployments
B. Large deployments
C. Medium deployments
D. Commercial deployments
E. Financial deployments

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码