单选题A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()AIt enables an attacker to perform an IP sweep of devices.BIt enables a hacker to know which operating system the system is running.CIt can overflow the session table to its limit, which can result in rejection of legitimate traffic.DIt creates a ping of death and can cause the entire network to be infected with a virus.

单选题
A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()
A

It enables an attacker to perform an IP sweep of devices.

B

It enables a hacker to know which operating system the system is running.

C

It can overflow the session table to its limit, which can result in rejection of legitimate traffic.

D

It creates a ping of death and can cause the entire network to be infected with a virus.


参考解析

解析: 暂无解析

相关考题:

You create a large, n-tier Web application that has a custom event tracking system. You need to create a custom event type that enables your event tracking system to record all relevant event details for all types of events. The events must be stored in Microsoft SQL Server.From which base type should your custom event type inherit? ()A. IWebEventCustomEvaluatorB. WebEventProviderC. WebBaseEventD. WebAuditEvent

A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?() A. It enables an attacker to perform an IP sweep of devices.B. It enables a hacker to know which operating system the system is running.C. It can overflow the session table to its limit, which can result in rejection of legitimate traffic.D. It creates a ping of death and can cause the entire network to be infected with a virus.

The ‘fsck -p /dev/lv00’command returned thefollowing message: Not a recognized filesystem type What is the likely cause of the problem and how should it be resolved?() A.The file system superblock is dirty. It can be replaced from the VGDAB.The logical volume superblock is dirty. It can be replaced from the VGDAC.The file system superblock is dirty. It can be replaced from the secondary copyD.The logical volume superblock is dirty. It can be replaced from the secondary copy

The system administrator did a new install of AIX on a server about a week ago. The system was not rebooted after the installation. CDE is running on this system as is TCPIP. The system administrator has started configuring the system percompany directives. The power cable was inadvertently disconnected from the wall causing the sever to lose power. Upon reboot, the system appears to hang during log in from the console or from Xterminals. Which of the following is the most probable cause?()A.It is a hardware problem caused by the power failure.B.There is a network problem, most probably with name resolution.C.Sine the system was never rebooted, devices are marked defined instead of available and need to be activated.D.Some filesets may be marked as broken and need to be reinstalled.

An administrator is troubleshooting a problem on an application server, but has not determined the cause of the problem and is not able to replicate the problem. Which of the following should the administrator do prior to escalating the issue?()A、Gather information from users.B、Reboot the server.C、Apply the latest service packs to the operating system.D、Perform a root cause analysis

A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()A、It enables an attacker to perform an IP sweep of devices.B、It enables a hacker to know which operating system the system is running.C、It can overflow the session table to its limit, which can result in rejection of legitimate traffic.D、It creates a ping of death and can cause the entire network to be infected with a virus.

What is the use of an "all configuration" backup in Cisco UCS?()A、 Can be used to migrate from a 6120 to a 6140 and retain the same service profilesB、 Can only be used on the fabric interconnect on which it was createdC、 Can be used to migrate from a 6120 to 6140 and retain system IP addresses and cluster informationD、 Can be used to match firmware versions between 6120 and 6140 during a migration

Which of the following will help protect an operating system from vulnerability?()A、Download free anti-virus programs from the Internet.B、Perform updates from the manufacturers website regularly.C、Using the operating systems email program only to open attachments.D、Monitoring what is displayed on the screen.

An administrator is troubleshooting a problem on an application server, but has not determined the cause of the problem and is not able to replicate the problem.  Which of the following should the administrator do prior to escalating the issue?()A、 Gather information from users.B、 Reboot the server.C、 Apply the latest service packs to the operating system.D、 Perform a root cause analysis.

The ‘fsck -p /dev/lv00’ command returned the following message:Not a recognized filesystem type. What is the likely cause of the problem and how should it be resolved?()A、The file system superblock is dirty. It can be replaced from the VGDAB、The logical volume superblock is dirty. It can be replaced from the VGDAC、The file system superblock is dirty. It can be replaced from the secondary copyD、The logical volume superblock is dirty. It can be replaced from the secondary copy

After installing the base operating system and the Server bundle, a system administrator decides to remove several printer definitions that the system users will not need. Which of the following procedures is the best way for a system administrator to remove the extra printer definitions?()A、Select the SMIT option to remove software productsB、Reinstall the desired filesets using the "Force Overwrite" optionC、Delete the unnecessary entries from the /usr/lpp/printers directoryD、Use the ODM edit (odem) utility to revmoe the definition from the system's ODM database

An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()A、DoSB、SYN floodC、port scanningD、IP address sweep

Which two statements are true about the WebLogic Cluster ?()A、 Clustered Servers capacity can be increased by adding new server instance to the cluster on an existing machineB、 Clustered Servers can be on a same or different machine with same operating system onlyC、 Clustered Servers can only be on a same machine or different operating systemD、 Clustered Servers can be on a same or different machine with same or different operating system

You create a large, n-tier Web application that has a custom event tracking system. You need to create a custom event type that enables your event tracking system to record all relevant event details for all types of events. The events must be stored in Microsoft SQL Server. From which base type should your custom event type inherit? ()A、IWeb Event Custom EvaluatorB、Web Event ProviderC、Web Base EventD、Web Audit Event

You create a large, n-tier Web application that has a custom event tracking system. You need to create a custom event type that enables your event tracking system to record all relevant event details for all types of events. The events must be stored in Microsoft SQL Server. From which base type should your custom event type inherit? ()A、IWebEventCustomEvaluatorB、WebEventProviderC、WebBaseEventD、WebAuditEvent

单选题The system administrator did a new install of AIX on a server about a week ago. The system was not rebooted after the installation. CDE is running on this system as is TCPIP. The system administrator has started configuring the system percompany directives. The power cable was inadvertently disconnected from the wall causing the sever to lose power. Upon reboot, the system appears to hang during log in from the console or from Xterminals. Which of the following is the most probable cause?()AIt is a hardware problem caused by the power failure.BThere is a network problem, most probably with name resolution.CSine the system was never rebooted, devices are marked defined instead of available and need to be activated.DSome filesets may be marked as broken and need to be reinstalled.

单选题What is the use of an "all configuration" backup in Cisco UCS?()A Can be used to migrate from a 6120 to a 6140 and retain the same service profilesB Can only be used on the fabric interconnect on which it was createdC Can be used to migrate from a 6120 to 6140 and retain system IP addresses and cluster informationD Can be used to match firmware versions between 6120 and 6140 during a migration

单选题The staff is not able to access a database server.  The server has an ’Operating System not found’error and is set to boot from a fiber channel SAN. All other database servers are set to boot from the SAN and access the same switch and data as this database server. Which of the following is the MOST likely cause of the problem?()AThe SAN is offlineBFiber channel switchCMultiple failed drives in the SANDHBA

单选题The operating system partition on a server is nearly out of space on a Windows 2003 Server. The administrator notices that the file pagefile.sys is taking up nearly 2GB of space. Which of the following would BEST resolve this problem?()AMove the page file to a free drive.BDelete the file.CAdd more memory.DRemove the page file from system properties

单选题Which of the following will help protect an operating system from vulnerability?()ADownload free anti-virus programs from the Internet.BPerform updates from the manufacturers website regularly.CUsing the operating systems email program only to open attachments.DMonitoring what is displayed on the screen.

单选题After installing the base operating system and the Server bundle, a system administrator decides to remove several printer definitions that the system users will not need. Which of the following procedures is the best way for a system administrator to remove the extra printer definitions?()ASelect the SMIT option to remove software productsBReinstall the desired filesets using the Force Overwrite optionCDelete the unnecessary entries from the /usr/lpp/printers directoryDUse the ODM edit (odem) utility to revmoe the definition from the system's ODM database

单选题A system administrator has filesystems that should not be mounted during system startup. How can the system administrator prevent the /data filesystem from being mounted during subsequent boots?()Amount -no /dataBchfs -A no /dataCmount -t nfs /dataDchfs -a type=nfs /data

单选题A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()AIt enables an attacker to perform an IP sweep of devices.BIt enables a hacker to know which operating system the system is running.CIt can overflow the session table to its limit, which can result in rejection of legitimate traffic.DIt creates a ping of death and can cause the entire network to be infected with a virus.

单选题An administrator is troubleshooting a problem on an application server, but has not determined the cause of the problem and is not able to replicate the problem.  Which of the following should the administrator do prior to escalating the issue?()A Gather information from users.B Reboot the server.C Apply the latest service packs to the operating system.D Perform a root cause analysis.

单选题You create a large, n-tier Web application that has a custom event tracking system. You need to create a custom event type that enables your event tracking system to record all relevant event details for all types of events. The events must be stored in Microsoft SQL Server. From which base type should your custom event type inherit? ()AIWebEventCustomEvaluatorBWebEventProviderCWebBaseEventDWebAuditEvent

单选题You create a large, n-tier Web application that has a custom event tracking system. You need to create a custom event type that enables your event tracking system to record all relevant event details for all types of events. The events must be stored in Microsoft SQL Server. From which base type should your custom event type inherit? ()AIWeb Event Custom EvaluatorBWeb Event ProviderCWeb Base EventDWeb Audit Event

单选题The ‘fsck -p /dev/lv00’command returned thefollowing message: Not a recognized filesystem type What is the likely cause of the problem and how should it be resolved?()AThe file system superblock is dirty. It can be replaced from the VGDABThe logical volume superblock is dirty. It can be replaced from the VGDACThe file system superblock is dirty. It can be replaced from the secondary copyDThe logical volume superblock is dirty. It can be replaced from the secondary copy

单选题An administrator is troubleshooting a problem on an application server, but has not determined the cause of the problem and is not able to replicate the problem. Which of the following should the administrator do prior to escalating the issue?()AGather information from users.BReboot the server.CApply the latest service packs to the operating system.DPerform a root cause analysis