单选题Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server?()Adenial of serviceBbrute forceCreconnaissanceDTrojan horse

单选题
Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server?()
A

denial of service

B

brute force

C

reconnaissance

D

Trojan horse 


参考解析

解析: 暂无解析

相关考题:

A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?() A. It enables an attacker to perform an IP sweep of devices.B. It enables a hacker to know which operating system the system is running.C. It can overflow the session table to its limit, which can result in rejection of legitimate traffic.D. It creates a ping of death and can cause the entire network to be infected with a virus.

Click the Exhibit button.A user logs in, is assigned the default role, and successfully loads the Host Enforcer policies shown in the exhibit.Which three statements are true? () A. The local host will respond to ICMP echo-request packets from 192.168.53.10.B. The local host will respond to UDP port 53 requests from 192.168.1.25.C. The local host can send any packet of any type to host 172.16.1.1.D. The local host will accept any packet of any type from host 172.16.1.1.E. The local host can send packets to UDP port512 on server 192.168.53.10.

OSPFv3 is used to route which type of packets?() A. IPv4B. IPv6C. MPLSD. IS-IS

A user opens a webpage that requires the transmission of packets from the Web server to the client‘s browser. The packets transmitted from the Web server to the client exceed the smallest MTU value on the communications path.Which two protocol functions allow this type of communication?()A. packet segmentationB. serialized checkingC. packet sequencingD. parallel checking

Which of the following network topologies is characterized by a central server and uniqueconnections to all clients? () A.StarB.BusC.MeshD.Ring

When policy - based routing (PBR) is being configured, which three criteria can the set command specify?() A. all interfaces in the path toward the destinationB. all networks in the path toward the destinationC. adjacent next hop router in the path toward the destinationD. all routers in the path toward the destinationE. all interfaces through which the packets can be routedF. type of service and precedence in the IP packets

Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?() A.denial of serviceB.brute forceC.reconnaissanceD.Trojan horse

Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server()。 A.denial of serviceB.brute forceC.reconnaissanceD.Trojan horse

Which three statements are true about the data traffic characteristics of voice traffic? ()A、latency must be kept below 150 msB、latency is not a concern as long as jitter is kept below 30 msC、voice packets do not require a specific type of queuingD、voice packets are rather smallE、voice packets require TCP for rapid retransmission of dropped packetsF、voice packets require a fairly constant bandwidth reserved for voice control traffic as well as forthe voice payload

When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()A、all interfaces in the path toward the destinationB、all networks in the path toward the destinationC、adjacent next hop router in the path toward the destinationD、all routers in the path toward the destinationE、all interfaces through which the packets can be routedF、type of service and precedence in the IP packets

You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()A、from source-portB、from source-addressC、from destination-addressD、from destination-port

OSPFv3 is used to route which type of packets?()A、IPv4B、IPv6C、MPLSD、IS-IS

Which statement best describes OSPF external LSAs (type 5)?()A、OSPF external LSAs are automatically flooded into all OSPF areas, unlike type 7 LSAs, which require that redistribution be configured.B、External LSAs (type 5) are automatically changed to type 1 LSAs at ASBRs.C、Type 5 LSAs are route summaries describing routes to networks outside the OSPF Autonomous System.D、External network LSAs (type 5) redistributed from other routing protocols into OSPF are not permitted to flood into a stub area.

Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server()。A、denial of serviceB、brute forceC、reconnaissanceD、Trojan horse

Which three statements are true about DAI?()A、DAI intercept all ARP packets on untrusted portsB、DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP Snooping database.C、DAI is used to prevent against a DHCP Snooping attack.D、DAI forwards all ARP packets received on a trusted interface without any checks.E、DAI forwards all ARP packets on untrusted ports.F、DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the CAM table.

Which of the following network topologies is characterized by a central server and uniqueconnections to all clients? ()A、StarB、BusC、MeshD、Ring

单选题An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()ADoSBSYN floodCport scanningDIP address sweep

多选题Which three statements are true about the data traffic characteristics of voice traffic? ()Alatency must be kept below 150 msBlatency is not a concern as long as jitter is kept below 30 msCvoice packets do not require a specific type of queuingDvoice packets are rather smallEvoice packets require TCP for rapid retransmission of dropped packetsFvoice packets require a fairly constant bandwidth reserved for voice control traffic as well as forthe voice payload

单选题Which type of transport may you take when the roads flood in Kolkata?AA bus.BA taxi.CA car.DA rickshaw.

多选题Which three statements are true about DAI?()ADAI intercept all ARP packets on untrusted portsBDAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP Snooping database.CDAI is used to prevent against a DHCP Snooping attack.DDAI forwards all ARP packets received on a trusted interface without any checks.EDAI forwards all ARP packets on untrusted ports.FDAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the CAM table.

多选题Which three statements are true regarding IDP?()AIDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.BIDP inspects traffic up to the Application layer.CIDP searches the data stream for specific attack patterns.DIDP inspects traffic up to the Presentation layer.EIDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.

多选题A user opens a webpage that requires the transmission of packets from the Web server to the client's browser. The packets transmitted from the Web server to the client exceed the smallest MTU value on the communications path. Which two protocol functions allow this type of communication?()Apacket segmentationBserialized checkingCpacket sequencingDparallel checking

单选题A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()AAll traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewableBClients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patternsCAll traffic is redirected to the VLAN that the attacker used to flood the CAM tableDAll traffic is flooded out all ports and an attacker is able to capture all dataENone of the other alternatives apply

单选题Which statement best describes OSPF external LSAs (type 5)?()AOSPF external LSAs are automatically flooded into all OSPF areas, unlike type 7 LSAs, which require that redistribution be configured.BExternal LSAs (type 5) are automatically changed to type 1 LSAs at ASBRs.CType 5 LSAs are route summaries describing routes to networks outside the OSPF Autonomous System.DExternal network LSAs (type 5) redistributed from other routing protocols into OSPF are not permitted to flood into a stub area

单选题Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()Adenial of serviceBbrute forceCreconnaissanceDTrojan horse

单选题OSPFv3 is used to route which type of packets?()AIPv4BIPv6CMPLSDIS-IS

单选题Where do you configure SCREEN options?()Azones on which an attack might arriveBzones you want to protect from attackCinterfaces on which an attack might arriveDinterfaces you want to protect from attack

单选题Which of the following type of packets can easily be filtered with a stateful packet filter by enforcing the context or state of the request?以下那个协议很容易的根据请求状态或者环境被状态包过滤设备进行过滤?()ATCPBUDPCIPDICMP