单选题Which of the following would an attacker use to footprint a system?()ARADIUSBPassword crackerCPort scannerDMan-in-the-middle attack

单选题
Which of the following would an attacker use to footprint a system?()
A

RADIUS

B

Password cracker

C

Port scanner

D

Man-in-the-middle attack


参考解析

解析: 暂无解析

相关考题:

Which of the following utilities would a technician use to prevent a service from starting duringsystem startup?() A. Event ViewerB. System File CheckerC. MSCONFIGD. Task Manager

A user has forgotten their BIOS password on their computer. Which of the following would atechnician use to allow the user access to their PC?() A. Remove the BIOS chip on the PCB. Re-flash the BIOSC. Run password cracking software on the users PCD. Set the password clear jumper on the motherboard

A technician needs to manage a switch by using the management port on the back of the switch.Which of the following cables would the technician use?() A.StraightB.ConsoleC.CrossoverD.Loopback

Which of the following monitors a server to see which protocols might be in use?() A. Ping sweepB. Intrusion detection softwareC. Port scannerD. Wireless packet sniffer

A technician needs to manage a switch by using the management port on the back of the switch.Which of the following cables would the technician use?()A、StraightB、ConsoleC、CrossoverD、Loopback

Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()A、Network layer firewallB、Stateful inspection firewallC、Zone aware firewallD、Application layer firewall

Which of the following commands would a system administrator use to automate monitoring and notification of filling filesystems ()A、startcondrespB、filemonC、lsfsD、mount

Which of the following monitors a server to see which protocols might be in use?()A、Ping sweepB、Intrusion detection softwareC、Port scannerD、Wireless packet sniffer

Which two statements about common network attacks are true?()A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.B、Access attacks can consist of password attacks,ping sweeps,port scans,and man-in-the-middle attacks.C、Access attacks can consist of packet sniffers,ping sweeps,port scans,and man-in-the-middle attacks.D、Reconnaissance attacks can consist of password attacks,trust exploitation,port redirection and Internet information queries.E、Reconnaissance attacks can consist of packet sniffers,port scans,ping sweeps,and Internet information queries.F、Reconnaissance attacks can consist of ping sweeps,port scans,man-in-middle attacks and Internet information queries.

Observe the following options carefully, which two attacks focus on RSA? ()A、BPA attackB、Adaptive chosen ciphertext attackC、DDoS attackD、Man-in-the-middle attack

Which of the following would an attacker use to footprint a system?()A、RADIUSB、Password crackerC、Port scannerD、Man-in-the-middle attack

Which of the following locations would a technician use to add a Windows 7 computer to adomain?()A、System PropertiesB、Windows DefenderC、Network and Sharing CenterD、Device Manager

A user has forgotten their BIOS password on their computer. Which of the following would atechnician use to allow the user access to their PC?()A、Remove the BIOS chip on the PCB、Re-flash the BIOSC、Run password cracking software on the users PCD、Set the password clear jumper on the motherboard

Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()A、Protocol analyzerB、Vulnerability scannerC、Port scannerD、Penetration test

Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS

A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()A、User ID/password fileB、Communications layerC、Client applicationsD、Operating system

Which of the following commands would a system administrator use to initiate a rescan of the /etc/inittab file()A、telinit -qB、init -rC、initab -sD、exec /etc/inittab

Which of the following commands would an administrator use to add startup scripts to the system startup process()A、chitabB、vi /etc/inittabC、vi /etc/rc.dD、mkitab

An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()A、DoSB、SYN floodC、port scanningD、IP address sweep

单选题Which of the following commands would a system administrator use to initiate a rescan of the /etc/inittab file()Atelinit -qBinit -rCinitab -sDexec /etc/inittab

单选题An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()ADoSBSYN floodCport scanningDIP address sweep

单选题Which of the following commands would an administrator use to add startup scripts to the system startup process()AchitabBvi /etc/inittabCvi /etc/rc.dDmkitab

单选题Which of the following commands would a system administrator use to automate monitoring and notification of filling filesystems ()AstartcondrespBfilemonClsfsDmount

单选题A technician needs to manage a switch by using the management port on the back of the switch.Which of the following cables would the technician use?()AStraightBConsoleCCrossoverDLoopback

单选题A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()AUser ID/password fileBCommunications layerCClient applicationsDOperating system

单选题Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()ANetwork layer firewallBStateful inspection firewallCZone aware firewallDApplication layer firewall

单选题A user has forgotten their BIOS password on their computer. Which of the following would atechnician use to allow the user access to their PC?()ARemove the BIOS chip on the PCBRe-flash the BIOSCRun password cracking software on the users PCDSet the password clear jumper on the motherboard