单选题An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()ADoSBSYN floodCport scanningDIP address sweep

单选题
An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()
A

DoS

B

SYN flood

C

port scanning

D

IP address sweep


参考解析

解析: 暂无解析

相关考题:

Which two types of attacks are considered to be denial of service?() (Choose two.) A. zombie agentsB. SYN floodC. IP packet fragmentsD. WinNuke

Which parameters are valid SCREEN options for combating operating system probes?() A. syn-fin, syn-flood, and tcp-no-fragB. syn-fin, port-scan, and tcp-no-flagC. syn-fin, fin-no-ack, and tcp-no-fragD. syn-fin, syn-ack-ack-proxy, and tcp-no-frag

For which network anomaly does Junos provide a SCREEN?() A. a telnet to port 80B. a TCP packet with the SYN and ACK flags setC. an SNMP getnext requestD. an ICMP packet larger than 1024 bytes

On which destination port in the Layer 4 header does BGP listen?() A. UDP port 169B. TCP port 169C. UDP port 179D. TCP port 179

TCP/IP的通信过程是?()A、——SYN/ACK——,——ACK,——SYN/ACK——B、——SYN/ACK——,——SYN/ACK——,——ACK——C、——SYN——,——ACK,——SYN——,——ACK——D、——SYN——,——SYN/ACK——,——ACK——

Which of the following descriptions about IP spoofing is correct?()A、IP source address is forgedB、IP destination address is forgedC、IP TCP source port is forgedD、IP TCP destination port is forgedE、None of above

NBAR supports all of these with the exception of which one?()A、HTTPB、IP multicastC、TCP flows with dynamically assigned port numbersD、non-UDP protocols

Interface ge-0/0/2.0 of your router is attached to the Internet and is configured with an IP address and network mask of 71.33.252.17/24. A host with IP address 10.20.20.1 is running an HTTP service on TCP port 8080. This host isattached to the ge-0/0/0.0 interface of your router. You must use interface-based static NAT to make the HTTP service on the host reachable from the Internet. On which IP address and TCP port can Internet hosts reach the HTTP service?()A、IP address 10.10.10.1 and TCP port 8080B、IP address 71.33.252.17 and TCP port 80C、IP address 71.33.251.19 and TCP port 80D、IP address 71.33.252.19 and TCP port 8080

For which network anomaly does Junos provide a SCREEN?()A、a telnet to port 80B、a TCP packet with the SYN and ACK flags setC、an SNMP getnext requestD、an ICMP packet larger than 1024 bytes

Nmap工具不可以执行下列哪种方式扫描()。A、目录遍历扫描B、TCP SYN扫描C、TCP connect扫描D、UDP port扫描

下面利用TCP的三次握手原理进行的攻击是()。A、IP欺骗B、SYN FloodC、Sumrf攻击D、Land攻击

To initiate testing,  which port does a Cisco IOS IP SLA source use to send a control message to an IP SLA responder? ()A、UDP port 2020B、UDP port 1967C、TCP port 2020D、ICMP port 1967

How doTCP SYN attacks take advantage ofTCPto prevent new connections from being established to a host under attack?()A、These attacks send multiple FIN segments forcing TCP connection release.B、These attacks fill up a hosts’ listen queue by failing to ACK partially openedTCPconnections.C、These attacks take advantage of the hosts transmit backoff algorithm by sending jam signals to the host.D、These attacks increment the ISN of each segment by a random number causing constant TCP retransmissions.E、These attacks send TCP RST segments in response toconnection SYN+ACK segments forcing SYN retransmissions.

Which of the following would an attacker use to footprint a system?()A、RADIUSB、Password crackerC、Port scannerD、Man-in-the-middle attack

Which parameters must you select when configuring operating system probes SCREEN options?()A、syn-fin, syn-flood, and tcp-no-fragB、syn-fin, port-scan, and tcp-no-flagC、syn-fin, fin-no-ack, and tcp-no-fragD、syn-fin, syn-ack-ack-proxy, and tcp-no-frag

Which two types of attacks are considered to be denial of service?() (Choose two.)A、zombie agentsB、SYN floodC、IP packet fragmentsD、WinNuke

Which parameters are valid SCREEN options for combating operating system probes?()A、syn-fin, syn-flood, and tcp-no-fragB、syn-fin, port-scan, and tcp-no-flagC、syn-fin, fin-no-ack, and tcp-no-fragD、syn-fin, syn-ack-ack-proxy, and tcp-no-frag

An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()A、DoSB、SYN floodC、port scanningD、IP address sweep

On which destination port in the Layer 4 header does BGP listen?()A、UDP port 169B、TCP port 169C、UDP port 179D、TCP port 179

单选题Interface ge-0/0/2.0 of your device is attached to the Internet and is configured with an IP address andnetwork mask of 71.33.252.17/24. A webserver with IP address 10.20.20.1 isrunning an HTTP service on TCP port 8080. The webserver is attached to the ge-0/0/0.0 interface of yourdevice. You must use NAT to make the webserver reachable from the Internet using port translation.Which type of NAT must you configure?()Asource NAT with address shiftingBpool-based source NATCstatic destination NATDpool-based destination NAT

单选题Which of the following descriptions about IP spoofing is correct?()AIP source address is forgedBIP destination address is forgedCIP TCP source port is forgedDIP TCP destination port is forgedENone of above

单选题For which network anomaly does Junos provide a SCREEN?()Aa telnet to port 80Ba TCP packet with the SYN and ACK flags setCan SNMP getnext requestDan ICMP packet larger than 1024 bytes

单选题How doTCP SYN attacks take advantage ofTCPto prevent new connections from being established to a host under attack?()AThese attacks send multiple FIN segments forcing TCP connection release.BThese attacks fill up a hosts’ listen queue by failing to ACK partially openedTCPconnections.CThese attacks take advantage of the hosts transmit backoff algorithm by sending jam signals to the host.DThese attacks increment the ISN of each segment by a random number causing constant TCP retransmissions.EThese attacks send TCP RST segments in response toconnection SYN+ACK segments forcing SYN retransmissions.

单选题To initiate testing,  which port does a Cisco IOS IP SLA source use to send a control message to an IP SLA responder? ()AUDP port 2020BUDP port 1967CTCP port 2020DICMP port 1967

单选题Which parameters are valid SCREEN options for combating operating system probes?()Asyn-fin, syn-flood, and tcp-no-fragBsyn-fin, port-scan, and tcp-no-flagCsyn-fin, fin-no-ack, and tcp-no-fragDsyn-fin, syn-ack-ack-proxy, and tcp-no-frag

单选题Interface ge-0/0/2.0 of your router is attached to the Internet and is configured with an IP address and network mask of 71.33.252.17/24. A host with IP address 10.20.20.1 is running an HTTP service on TCP port 8080. This host isattached to the ge-0/0/0.0 interface of your router. You must use interface-based static NAT to make the HTTP service on the host reachable from the Internet. On which IP address and TCP port can Internet hosts reach the HTTP service?()AIP address 10.10.10.1 and TCP port 8080BIP address 71.33.252.17 and TCP port 80CIP address 71.33.251.19 and TCP port 80DIP address 71.33.252.19 and TCP port 8080

单选题Which parameters must you select when configuring operating system probes SCREEN options?()Asyn-fin, syn-flood, and tcp-no-fragBsyn-fin, port-scan, and tcp-no-flagCsyn-fin, fin-no-ack, and tcp-no-fragDsyn-fin, syn-ack-ack-proxy, and tcp-no-frag