Which statement is true about a worm attack?()A、Human interaction is required to facilitate the spread.B、The worm executes arbitrary code and installs copies of itself in the memory of the infected computer.C、Extremely large volumes of requests are sent over a network or over the Internet.D、Data or commands are injected into an existing stream of data. That stream is passed between a client and server application.
Which statement is true about a worm attack?()
- A、Human interaction is required to facilitate the spread.
- B、The worm executes arbitrary code and installs copies of itself in the memory of the infected computer.
- C、Extremely large volumes of requests are sent over a network or over the Internet.
- D、Data or commands are injected into an existing stream of data. That stream is passed between a client and server application.
相关考题:
Evaluate the SQL statement: TRUNCATE TABLE DEPT; Which three are true about the SQL statement? () A. It releases the storage space used by the table.B. It does not release the storage space used by the table.C. You can roll back the deletion of rows after the statement executes.D. You can NOT roll back the deletion of rows after the statement executes.E. An attempt to use DESCRIBE on the DEPT table after the TRUNCATE statement executes will display an error.F. You must be the owner of the table or have DELETE ANY TABLE system privileges to truncate the DEPT table
Which three are true about the large pool for an Oracle database instance that supports shared serverconnections?() A. Allocates memory for RMAN backup and restore operationsB. Allocates memory for shared and private SQL areasC. Contains a cursor area for storing runtime information about cursorsD. Contains stack spaceE. Contains a hash area performing hash joins of tables
Which of the following does an out-of-memory error indicate on a printer?() A. A faulty memory module in the printer.B. A postscript print job has been sent to the printer.C. A large print job has been sent to the printer.D. The printer firmware needs to be updated.
Which of the following statements about language is NOT true?A.Language is a system B.Language is symbol C.Animals also have language D.Language is arbitrary
Which statement is true about TCN propagation?()A、The originator of the TCN immediately floods this information through the network.B、The TCN propagation is a two step process.C、A TCN is generated and sent to the root bridge.D、The root bridge must flood this information throughout the network.
What are two steps that must be taken when mitigating a worm attack?()A、Inoculate systems by applying update patches. B、Limit traffic rate. C、Apply authentication. D、Quarantine infected machines. E、Enable anti-spoof measures.
A WORM drive can be equated to which of the following common technologies?()A、 CDRWB、 CDRC、 Flash MediaD、 DVDRW
Which statement is true about a Smurf attack?()A、It sends ping requests in segments of an invalid sizeB、It intercepts the third step in a TCP three-way handshake to hijack a sessionC、It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemD、It uses Trojan horse applications to create a distributed collection of "zombie" computers, which can beused to launch a coordinated DDoS attack
Which of the following is a sign that a computer has been infected by a worm?()A、Screensaver changed on its ownB、Unauthorized outgoing emails being sentC、Desktop background changed on its ownD、Left and right mouse buttons have been flipped
Which of the following does an out-of-memory error indicate on a printer?()A、A faulty memory module in the printer.B、A postscript print job has been sent to the printer.C、A large print job has been sent to the printer.D、The printer firmware needs to be updated.
A batch application executes a large number of update statements. The service level agreement for the application states that the application must complete its work as quickly as possible to ensure that dependent workloads can start ontime. What is one way to help the application complete quickly?()A、Code the application to issue a LOCK TABLE statement. B、Code the application to issue a LOCK ROW statement. C、Decrease the number of I/O servers. D、Increase the locklist parameter.
Given the following code fragment: public void create() { Vector myVect; myVect = new Vector(); } Which of the following statements are true?() A、 The declaration on line 2 does not allocate memory space for the variable myVect.B、 The declaration on line 2 allocates memory space for a reference to a Vector object.C、 The statement on line 2 creates an object of class Vector.D、 The statement on line 3 creates an object of class Vector.E、 The statement on line 3 allocates memory space for an object of class Vector.
Which statement is true about the Manageability Monitor (MMON) background proces()A、It transfers statistics from memory to disk at regular intervals.B、It coordinates the rebalance activity for disk groups when ASM is used.C、It communicates with the Automatic Storage Management (ASM) instance on behalf of the databaseinstance.D、It performs dynamic memory management when Automatic Shared Memory Management is enabledfor the database instance.
Which two statements are true about Oracle ActiveCache ?()A、 it supports very large data-sets such as the result-sets from large search queries to be held in memoryB、 it provides a set of management tools that enables automation of configurationC、 it provides enhanced visibility across the entire application infrastructureD、 it significantly increases the performance of Web-based applications with no code change
Evaluate the SQL statement:TRUNCATE TABLE DEPT;Which three are true about the SQL statement? ()A、It releases the storage space used by the table.B、It does not release the storage space used by the table.C、You can roll back the deletion of rows after the statement executes.D、You can NOT roll back the deletion of rows after the statement executes.E、An attempt to use DESCRIBE on the DEPT table after the TRUNCATE statement executes will display an error.F、You must be the owner of the table or have DELETE ANY TABLE system privileges to truncate the DEPT table
Which three are true about the large pool for an Oracle database instance that supports shared serverconnections?()A、Allocates memory for RMAN backup and restore operationsB、Allocates memory for shared and private SQL areasC、Contains a cursor area for storing runtime information about cursorsD、Contains stack spaceE、Contains a hash area performing hash joins of tables
Which two statements are true about setting the per-thread buffers higher than required?()A、More memory per thread is beneficial in all scenariosB、It causes increased overhead due to initial memory allocationC、It can affect system stability during peak load times, due to swappingD、It requires increasing the thread_cache_size variable
You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm. Immediately send a notification to a network administrator that the infected computer needs to be repaired. What should you do?()A、Configure a WMI event trigger.B、Configure a Network Monitor capture filter.C、Configure a Network Monitor trigger.D、Configure a System Monitor alert.
Which statement is true about "sticky" load balancing for Clusters? ()A、The "clientip" setting does not apply to clusters, it only pertains to a Forwarder.B、When set to "clientip" it uses the client's IP address to bind the client to a particular target server.C、When set to "clientip" it allows a DX sticky cookie to be sent to and stored by the client based on the IP address.D、When set to "clientip" it ensures that all subsequent requests are directed to the same client that made the initial request.
单选题According to the passage, which of the following statements is true?AIn India, the infection rate almost reaches 12 percent of its population.BIn China, about 50,000 people are infected with HIV.CAIDS epidemic had caused 15,000,000 deaths in the whole world by January 2,000.DIn the United States, HIV infection will go on to attack about 5% of the whole population.
多选题Given the following code fragment: public void create() { Vector myVect; myVect = new Vector(); } Which of the following statements are true?()AThe declaration on line 2 does not allocate memory space for the variable myVect.BThe declaration on line 2 allocates memory space for a reference to a Vector object.CThe statement on line 2 creates an object of class Vector.DThe statement on line 3 creates an object of class Vector.EThe statement on line 3 allocates memory space for an object of class Vector.
多选题Which two statements are true about setting the per-thread buffers higher than required?()AMore memory per thread is beneficial in all scenariosBIt causes increased overhead due to initial memory allocationCIt can affect system stability during peak load times, due to swappingDIt requires increasing the thread_cache_size variable
多选题What are two steps that must be taken when mitigating a worm attack?()AInoculate systems by applying update patches.BLimit traffic rate.CApply authentication.DQuarantine infected machines.EEnable anti-spoof measures.
单选题Which statement is true about a worm attack?()AHuman interaction is required to facilitate the spread.BThe worm executes arbitrary code and installs copies of itself in the memory of the infected computer.CExtremely large volumes of requests are sent over a network or over the Internet.DData or commands are injected into an existing stream of data. That stream is passed between a client and server application.
单选题Which statement is true about a Smurf attack?()AIt sends ping requests in segments of an invalid sizeBIt intercepts the third step in a TCP three-way handshake to hijack a sessionCIt sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemDIt uses Trojan horse applications to create a distributed collection of zombie computers, which can beused to launch a coordinated DDoS attack
单选题Which of the following statements is NOT true about mass communication?AIt can reach no further than human voice.BIt can reach a large audience.CIt is rapid and efficient.DIt can be trusted.
多选题Which three are true about the large pool for an Oracle database instance that supports shared serverconnections?()AAllocates memory for RMAN backup and restore operationsBAllocates memory for shared and private SQL areasCContains a cursor area for storing runtime information about cursorsDContains stack spaceEContains a hash area performing hash joins of tables