BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate whatclassification of attack?()A、Sniffing attackB、Denial of service attackC、Port Scan attackD、Reconnaisance attackE、Spoofing attack

BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate whatclassification of attack?()

  • A、Sniffing attack
  • B、Denial of service attack
  • C、Port Scan attack
  • D、Reconnaisance attack
  • E、Spoofing attack

相关考题:

You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()A. then rejectB. then discardC. then next filterD. then silent-drop

You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()A. from source-portB. from source-addressC. from destination-addressD. from destination-port

A service provider wants to prevent the repeat of a denial of service (DoS) attack that recently disabled Internet access for several thousand customers. Which Cisco solution best matches this business need?()A.Network securityB.Virtual Private Network (VPN)C.Wireless networkD.Content networking

BCP(BestCommonPractices)38/RFC2827IngressandEgressPacketFilteringwouldhelpmitigatewhatclassificationofattack?() A.SniffingattackB.DenialofserviceattackC.PortScanattackD.ReconnaisanceattackE.Spoofingattack

Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?() A.denial of serviceB.brute forceC.reconnaissanceD.Trojan horse

Which two network attack statements are true?()A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.B、Access attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.C、DoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.D、DoS attacks can consist of IP spoofing and DDoS attacks.E、IP spoofing can be reduced through the use of policy-based routing.F、IP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.

Which type of attacks can be monitored and mitigated by CS-MARS using NetFlow data?()A、 Man-in-themiddle attackB、 Spoof attackC、 Land.C attackD、 Buffer OverflowE、 Day zero attackF、 Trojan Horse

A service provider wants to prevent the repeat of a denial of service (DoS) attack that recently disabled Internet access for several thousand customers. Which Cisco solution best matches this business need?()A、Network securityB、Virtual Private Network (VPN)C、Wireless networkD、Content networking

How would you characterize the source and type in a denial of service attack on a router?()A、By perfornubg a show ip interface to see the type and source of the attack based upon the access-listmatchesB、By performing a show interface to see the transmitted load "txload" and receive load "rxload" ;if the interface utilization is not maxed out ,there is no attack underwayC、By setting up an access-list to permit all ICMP,TCP,and UDP traffic with the log or log-input commands,then use the show access-list and show log commands to determine the type and sourceof attackD、By applying an access-list to all incoming and outgoing interfaces,turning off route-cache on all interfaces,then,when telnetting into the router perform a debug IP packet detail

Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()A、denial of serviceB、brute forceC、reconnaissanceD、Trojan horse

A service provider wants to prevent the repeat of a denial of service (DoS) attack that recently disabled Internet access for several thousand customers. Which Cisco solution best matches this business need?()A、Network securityB、Wireless networkC、Content networkingD、Virtual Private Network (VPN)

You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()A、from source-portB、from source-addressC、from destination-addressD、from destination-port

When implementing best practices for IP Source Address Spoofing and Defeating Denial of Service Attacks with IP SourceAddress Spoofing, what RFC is commonly usedto protect your network?()A、 RFC 1149B、 RFC 3704C、 RFC 1918D、 RFC 2827

What are BCP 38 (Best Common Practices 38)/RFC 2827 Ingress Packet Filtering Principles?()A、Filter Smurf ICMP packets.B、Filter as close to the core as possibleC、Filter as close to the edge as possibleD、Filter as precisely as possibleE、Filter both source and destination where possible

What are four methods used by hackers? ()A、footprint analysis attackB、privilege escalation attackC、buffer Unicode attackD、social engineering attackE、front door attacksF、Trojan horse attack

You are the network administrator of a Layer 3 switched network. Users in one VLAN are complaining thataccess to the server VLAN is very slow from time to time. Traffic in the local VLAN works without any issue,and users in other VLANs do not have any complaint to reach the server VLAN. What is most likely thecause of this issue?()A、routing issueB、denial-of-service attackC、MAC floodingD、spanning-tree recalculationE、Layer 2 loopF、ARP spoofing attack

TippingPoint IPS对应用保护的过滤器分为哪几类?()A、Attack Pretection,Reconnaissance,Security Policy,InformationalB、Attack Pretection,Scan,Security Policy,InformationalC、Attack Pretection,Reconnaissance,MisuserAbuse,InformationalD、Attack Pretectio,Scan,Security Policy,MisuserAbuse

Observe the following options carefully, which two attacks focus on RSA? ()A、BPA attackB、Adaptive chosen ciphertext attackC、DDoS attackD、Man-in-the-middle attack

Which firewall best practices can help mitigate worm and other automated attacks?()A、Segment security zonesB、Restrict access to firewallsC、Use logs and alertsD、Set connection limits

Which of the following would an attacker use to footprint a system?()A、RADIUSB、Password crackerC、Port scannerD、Man-in-the-middle attack

You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()A、then rejectB、then discardC、then next filterD、then silent-drop

Where do you configure SCREEN options?()A、zones on which an attack might arriveB、zones you want to protect from attackC、interfaces on which an attack might arriveD、interfaces you want to protect from attack

单选题BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate whatclassification of attack?()ASniffing attackBDenial of service attackCPort Scan attackDReconnaisance attackESpoofing attack

单选题When implementing best practices for IP Source Address Spoofing and Defeating Denial of Service Attacks with IP SourceAddress Spoofing, what RFC is commonly usedto protect your network?()A RFC 1149B RFC 3704C RFC 1918D RFC 2827

单选题How would you characterize the source and type in a denial of service attack on a router?()ABy perfornubg a show ip interface to see the type and source of the attack based upon the access-listmatchesBBy performing a show interface to see the transmitted load txload and receive load rxload ;if the interface utilization is not maxed out ,there is no attack underwayCBy setting up an access-list to permit all ICMP,TCP,and UDP traffic with the log or log-input commands,then use the show access-list and show log commands to determine the type and sourceof attackDBy applying an access-list to all incoming and outgoing interfaces,turning off route-cache on all interfaces,then,when telnetting into the router perform a debug IP packet detail

单选题Which type of attacks can be monitored and mitigated by CS-MARS using NetFlow data?()A Man-in-themiddle attackB Spoof attackC Land.C attackD Buffer OverflowE Day zero attackF Trojan Horse

多选题What are BCP 38 (Best Common Practices 38)/RFC 2827 Ingress Packet Filtering Principles?()AFilter Smurf ICMP packets.BFilter as close to the core as possibleCFilter as close to the edge as possibleDFilter as precisely as possibleEFilter both source and destination where possible