单选题Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()Adenial of serviceBbrute forceCreconnaissanceDTrojan horse

单选题
Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()
A

denial of service

B

brute force

C

reconnaissance

D

Trojan horse


参考解析

解析: 暂无解析

相关考题:

Once the TCP connection is established, which message type initiates the BGP peering process?() A. OpenB. ActiveC. UpdateD. Notification

Which Packet Flow Acceleration feature is most effective for short-lived TCP sessions?() A. Active Flow PipeliningB. Fast Connection SetupC. TCP Acceleration (AFP)D. Forward Error Correction

A user reports being occasionally disconnected from the server. Which of the following tools couldthe technician use to determine if it is the client or the server that is dropping the connection?() A. Packet snifferB. MultimeterC. Load balancerD. Throughput tester

Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?() A.denial of serviceB.brute forceC.reconnaissanceD.Trojan horse

Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server()。 A.denial of serviceB.brute forceC.reconnaissanceD.Trojan horse

Which type of attacks can be monitored and mitigated by CS-MARS using NetFlow data?()A、 Man-in-themiddle attackB、 Spoof attackC、 Land.C attackD、 Buffer OverflowE、 Day zero attackF、 Trojan Horse

How would you characterize the source and type in a denial of service attack on a router?()A、By perfornubg a show ip interface to see the type and source of the attack based upon the access-listmatchesB、By performing a show interface to see the transmitted load "txload" and receive load "rxload" ;if the interface utilization is not maxed out ,there is no attack underwayC、By setting up an access-list to permit all ICMP,TCP,and UDP traffic with the log or log-input commands,then use the show access-list and show log commands to determine the type and sourceof attackD、By applying an access-list to all incoming and outgoing interfaces,turning off route-cache on all interfaces,then,when telnetting into the router perform a debug IP packet detail

Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()A、denial of serviceB、brute forceC、reconnaissanceD、Trojan horse

Which software-based security threat is typically spread from user to user via e-mail?()A、VirusB、Trojan horseC、Denial of serviceD、Data interception

BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate whatclassification of attack?()A、Sniffing attackB、Denial of service attackC、Port Scan attackD、Reconnaisance attackE、Spoofing attack

Which statement is true about a Smurf attack?()A、It sends ping requests in segments of an invalid sizeB、It intercepts the third step in a TCP three-way handshake to hijack a sessionC、It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemD、It uses Trojan horse applications to create a distributed collection of "zombie" computers, which can beused to launch a coordinated DDoS attack

What are four methods used by hackers? ()A、footprint analysis attackB、privilege escalation attackC、buffer Unicode attackD、social engineering attackE、front door attacksF、Trojan horse attack

Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server()。A、denial of serviceB、brute forceC、reconnaissanceD、Trojan horse

A user reports being occasionally disconnected from the server. Which of the following tools couldthe technician use to determine if it is the client or the server that is dropping the connection?()A、Packet snifferB、MultimeterC、Load balancerD、Throughput tester

Once the TCP connection is established, which message type initiates the BGP peering process?()A、OpenB、ActiveC、UpdateD、Notification

Which Packet Flow Acceleration feature is most effective for short-lived TCP sessions?()A、Active Flow PipeliningB、Fast Connection SetupC、TCP Acceleration (AFP)D、Forward Error Correction

Once the TCP connection is established, which message type initiates the BGP peering process?()A、OpenB、ActiveC、UpdateD、KeepaliveE、Notification

Your company has a server that runs Windows Server 2008 R2. The server is configured as a remoteaccess server. The external firewall has TCP port 80 and TCP port 443 open for remoteconnections. You have a home computer that runs Windows 7. You need to establish secure remote accessconnection from the home computer to the remote access server.  Which type of connection should you configure? ()A、IPSECB、L2TPC、PPTPD、SSTP

单选题An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()ADoSBSYN floodCport scanningDIP address sweep

单选题Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server?()Adenial of serviceBbrute forceCreconnaissanceDTrojan horse

单选题Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()Aclose-connectionBterminate-connectionCclose-client-and-serverDterminate-session

单选题Once the TCP connection is established, which message type initiates the BGP peering process?()AOpenBActiveCUpdateDKeepaliveENotification

单选题How would you characterize the source and type in a denial of service attack on a router?()ABy perfornubg a show ip interface to see the type and source of the attack based upon the access-listmatchesBBy performing a show interface to see the transmitted load txload and receive load rxload ;if the interface utilization is not maxed out ,there is no attack underwayCBy setting up an access-list to permit all ICMP,TCP,and UDP traffic with the log or log-input commands,then use the show access-list and show log commands to determine the type and sourceof attackDBy applying an access-list to all incoming and outgoing interfaces,turning off route-cache on all interfaces,then,when telnetting into the router perform a debug IP packet detail

单选题Which statement is true about a Smurf attack?()AIt sends ping requests in segments of an invalid sizeBIt intercepts the third step in a TCP three-way handshake to hijack a sessionCIt sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemDIt uses Trojan horse applications to create a distributed collection of zombie computers, which can beused to launch a coordinated DDoS attack

单选题Which type of attacks can be monitored and mitigated by CS-MARS using NetFlow data?()A Man-in-themiddle attackB Spoof attackC Land.C attackD Buffer OverflowE Day zero attackF Trojan Horse

单选题Your company has a server that runs Windows Server 2008 R2. The server is configured as a remoteaccess server. The external firewall has TCP port 80 and TCP port 443 open for remoteconnections. You have a home computer that runs Windows 7. You need to establish secure remote accessconnection from the home computer to the remote access server.  Which type of connection should you configure? ()AIPSECBL2TPCPPTPDSSTP

单选题Which Packet Flow Acceleration feature is most effective for short-lived TCP sessions?()AActive Flow PipeliningBFast Connection SetupCTCP Acceleration (AFP)DForward Error Correction