An attacker is launching a DoS attack on the Company network using a hacking tool designed to  exhaust the IP address space available from the DHCP servers for a period of time.  Which  procedure would best defend against this type of attack? ()A、 Configure only trusted interfaces with root guard.B、 Implement private VLANs (PVLANs) to carry only user traffic.C、 Implement private VLANs (PVLANs) to carry only DHCP traffic.D、 Configure only untrusted interfaces with root guard.E、 Configure DHCP spoofing on all ports that connect untrusted clients.F、 Configure DHCP snooping only on ports that connect trusted DHCP servers.G、 None of the other alternatives apply

An attacker is launching a DoS attack on the Company network using a hacking tool designed to  exhaust the IP address space available from the DHCP servers for a period of time.  Which  procedure would best defend against this type of attack? ()

  • A、 Configure only trusted interfaces with root guard.
  • B、 Implement private VLANs (PVLANs) to carry only user traffic.
  • C、 Implement private VLANs (PVLANs) to carry only DHCP traffic.
  • D、 Configure only untrusted interfaces with root guard.
  • E、 Configure DHCP spoofing on all ports that connect untrusted clients.
  • F、 Configure DHCP snooping only on ports that connect trusted DHCP servers.
  • G、 None of the other alternatives apply

相关考题:

Grabbing Weinstein ______the jaw,the attacker told her he had a gun and forced her into her car.A. withB. toC. inD. by

ZPW-2000A型自动闭塞,区间正常码序应为()。 A.L5-L4-L3-L2-L-LU-U-HUB.L-L2-L3-L4-L5-LU-U-HUC.L5-L4-L3-L2-L1-L-LU-U-HUD.L5-L4-L3-L2-L-LU-U2-U-HU

She was able to () her attacker and reported him immediately to the police nearby. A、identifyB、knowC、realizeD、regard

A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?() A. It enables an attacker to perform an IP sweep of devices.B. It enables a hacker to know which operating system the system is running.C. It can overflow the session table to its limit, which can result in rejection of legitimate traffic.D. It creates a ping of death and can cause the entire network to be infected with a virus.

There are different ways to perform. IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment (1)(e.g.TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other (2), the attacker inserts a large amount of (3)packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an (4)who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE) eNodeB is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(5)the net work.A.message B.information C.request D.dateA.methods B.cases C.hands D.sectionsA.bad B.cases C.fake D.newA.or B.administrator C.editor D.attackerA.or B.of C.in D.to

We had only a vague description of the attacker.A:concise B:impreciseC:unpolished D:elementary

There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment?( )(e.g. TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other?(请作答此空), the attacker inserts a large amount of?( )packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an?( )who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.Legacy?mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE)eNodeB ?is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device( )the network.A. methodsB. casesC. handsD. sections

There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment( )(e.g. TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other( ), the attacker inserts a large amount of( )packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an( )who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.Legacy?mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE)eNodeB ?is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(请作答此空)the network.A. orB. ofC. in D .to

There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment( )(e.g. TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other( ), the attacker inserts a large amount of( )packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an(请作答此空)who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.Legacy?mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE)eNodeB ?is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device()the network.A. orB. administratorC. editorD. attacker

There are different ways to perform IP based DoS Attacks.The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment(71)(e.g.TCP SYN requests)to establish hanging connections with the controller or a DPS.Such a way,the attacker can consume the network resources which should be available for legitimate users.In other(72),the attacker inserts a large amount of(73)packets to the data plane by spoofing all or part of the header fields with random values.These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources.In some cases,an(本题)who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources.Moreover,the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment.Moreover,legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller.These features minimize both the impact and propagation of DoS attacks.Moreover,the legacy backhaul devices are controlled as a joint effort of multiple network element.For instance,a single Long Term Evilution(LTE)eNodeB is connected up to 32 MMEs.Therefore,DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(75)the network.A.orB.administratorC.editorD.attacker

Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()A、Attacker sends multiple DHCP requests flooding DHCP serverB、Attacker connects rogue server initiating DHCP requestsC、Attacker connects rogue server replying to DHCP requestsD、Attacker sends DHCP jam signal causing DHCP server to crashE、Attacker sends gratuitous ARP replies, thereby jamming the DHCP serverF、Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server

电感的串联公式是()。A、L=L1+L2+L3B、L=L1L2/L1+L2C、L=1/L1+1/L2D、1/L=1/L1+L2

区间轨道电路的正常码序应为()。A、L5-L4-L3-L2-L-LU-U-HUB、L-L2-L3-L4-L5-LU-U-HUC、L5-L4-L3-L2-L-U-LU-HUD、L5-L4-L3-L2-L-LU-HU-U

The CS-MARS appliance offers attackmitigatons using which twomethods?  ()A、 Automatically pushing ACLs to layer 3 devices to block the attacker’s trafficB、 Automatically pushing commands to layer 2 switches to shutdown the attacker’s portsC、 Automatically resetting the attacker’sTCP connectionsD、 RecommendingACLs tobe manuallypushed tolayer 3 devices such as routers/firewallsE、 Operating as an inline appliance, it automaticallyblocks malicious traffic inlineF、 Working inconjuction with CSM to block the attacker’s traffic inline

A technician notices that the BIOS event log shows a chassis intrusion. Which of the following is theMOST likely reason for the event? ()A、There is a loose object in the case.B、An optical drive drawer is open.C、The computer case was opened.D、An attacker hacked into the system.

Which of the following would an attacker use to footprint a system?()A、RADIUSB、Password crackerC、Port scannerD、Man-in-the-middle attack

Which of the following could be used to prevent an attacker from accessing the master boot drive when attaching a hard drive to another system?()A、BIOS passwordB、Domain membershipC、EFSD、Bitlocker

Which two statements regarding asymmetric key encryption are true?()A、The same key is used for encryption and decryption.B、It is commonly used to create digital certificate signatures.C、It uses two keys: one for encryption and a different key for decryption.D、An attacker can decrypt data if the attacker captures the key used for encryption

单选题An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()ADoSBSYN floodCport scanningDIP address sweep

多选题Which two statements regarding asymmetric key encryption are true?()AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption

单选题A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()AIt enables an attacker to perform an IP sweep of devices.BIt enables a hacker to know which operating system the system is running.CIt can overflow the session table to its limit, which can result in rejection of legitimate traffic.DIt creates a ping of death and can cause the entire network to be infected with a virus.

多选题The CS-MARS appliance offers attackmitigatons using which twomethods?  ()AAutomatically pushing ACLs to layer 3 devices to block the attacker’s trafficBAutomatically pushing commands to layer 2 switches to shutdown the attacker’s portsCAutomatically resetting the attacker’sTCP connectionsDRecommendingACLs tobe manuallypushed tolayer 3 devices such as routers/firewallsEOperating as an inline appliance, it automaticallyblocks malicious traffic inlineFWorking inconjuction with CSM to block the attacker’s traffic inline

单选题In a brute-force attack, what percentage of the keyspace must an attacker generally search through until heor she finds the key that decrypts the data?()ARoughly 50 percentBRoughly 66 percent ActualTests.comCRoughly 75 percentDRoughly 10 percent

单选题A technician notices that the BIOS event log shows a chassis intrusion. Which of the following is theMOST likely reason for the event? ()AThere is a loose object in the case.BAn optical drive drawer is open.CThe computer case was opened.DAn attacker hacked into the system.

单选题You work as a network technician at Company. Your boss, Mrs.   , is interested in   switch spoofing.  She asks you how an attacker would collect information with VLAN hoping  through switch spoofing. You should tell her that the attacking station... ()A...uses VTP to collect VLAN information that is sent out and then tags itself with the domain  information in order to capture the data.B...will generate frames with two 802.1Q headers to cause the switch to forward the frames to a  VLAN that would be inaccessible to the attacker through legitimate means.C...uses DTP to negotiate trunking with a switch port and captures all traffic that is allowed on the  trunk.D...tags itself with all usable VLANs to capture data that is passed through the switch, regardless  of the VLAN to which the data belongs.ENone of the other alternatives apply

单选题A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()AAll traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewableBClients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patternsCAll traffic is redirected to the VLAN that the attacker used to flood the CAM tableDAll traffic is flooded out all ports and an attacker is able to capture all dataENone of the other alternatives apply

多选题Which two statements regarding symmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption.