Which two network attack statements are true?()A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.B、Access attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.C、DoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.D、DoS attacks can consist of IP spoofing and DDoS attacks.E、IP spoofing can be reduced through the use of policy-based routing.F、IP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.

Which two network attack statements are true?()

  • A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.
  • B、Access attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.
  • C、DoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.
  • D、DoS attacks can consist of IP spoofing and DDoS attacks.
  • E、IP spoofing can be reduced through the use of policy-based routing.
  • F、IP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.

相关考题:

Which two patented or patent-pending compression and caching technologies are used for WX/WXC devices?()(Choose two.) A. Network Sequence Caching (NSC)B. Molecular Sequence Caching (MSC)C. Network Sequence Reduction (NSR)D. Molecular Sequence Reduction (MSR)

Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.Which two actions should you perform?() A.AB.BC.CD.DE.E

You are an experienced network administrator in an international corporation. One of your clients asks you to configure a network for a financial trading center which requires multiple high-value transactions.And the transactions are very important to the client. In such a situation, which two of the following are basic and most important requirements concerning the configuration? ()(Choose two.)A. no single point of failureB. determine which protocol to useC. trading database server locationD. deterministic response to all failures

Which two benefits does VoFR provide?() A. bandwidth efficiencyB. cell-switchingC. congestion notificationD. heterogeneous network

Which of the following statements describe the network shown in the graphic?() A. There are two broadcast domains in the network.B. There are four broadcast domains in the network.C. There are six broadcast domains in the network.D. There are four collision domains in the network.E. There are five collision domains in the network.F. There are seven collision domains in the network.

Which two devices can interfere with the operation of a wireless network because they operate on similar frequencies? (Choose two.)()A、copierB、microwave ovenC、toasterD、cordless phoneE、IP phoneF、AM radio

Which two of the following options are categories of Network Maintenance tasks?()A、FirefightingB、Interrupt-drivenC、Policy-basedD、StructuredE、Foundational

You are an experienced network administrator in an international corporation. One of your clients asks you to configure a network for a financial trading center which requires multiple high-value transactions. And the transactions are very important to the client. In such a situation, which two of the following are basic and most important requirements concerning the configuration? ()(Choose two.)A、no single point of failureB、determine which protocol to useC、trading database server locationD、deterministic response to all failures

Which two OSPF LSA types are new in OSPF version 3? ()A、LinkB、NSSA externalC、Network linkD、Intra-area prefixE、AS domain

Layer 3 (the network layer) provides connectivity and path selection between two host systems that may be located on geographically separated networks. Which two devices operate at the network layer?()A、 applicationB、 hubC、 switchD、 bridgeE、 router

Which two are characteristics of the IS -IS protocol but not OSPF?()A、forms adjacencies with all neighborsB、supports demand circuit routingC、provides routing support for multiple network layer protocolsD、utilizes SPF algorithmE、provides for network scalability by allowing the network to be separated into areasF、three layers of hierarchical routing

In which two locations in an enterprise network can an IPS sensor be placed? ()A、 bridging VLANs on two switchesB、 bridging two VLANs on one switchC、 between two Layer 2 devices with trunkingD、 between two Layer 2 devices without trunkingE、 between a Layer 2 device and a Layer 3 device with trunking

Network management saves time and money by automating which two tasks? ()A、Configuring changes to hardware and softwareB、Monitoring online purchasingC、Monitoring user access to storage filesD、Monitoring and troubleshooting network devices

Which two are needed components when designing and implementing a security solution?()A、detailed VLAN informationB、an incident response planC、results of testing the new network configurationD、an existing hierarchical network topologyE、a security policy for your organization

Which of the following network topologies BEST describes a VPN? ()(Select TWO)A、Point to PointB、Point to MultipointC、VLAND、RingE、Bus

Which two patented or patent-pending compression and caching technologies are used for WX/WXC devices?()(Choose two.)A、Network Sequence Caching (NSC)B、Molecular Sequence Caching (MSC)C、Network Sequence Reduction (NSR)D、Molecular Sequence Reduction (MSR)

多选题When HSRP is configured on a network, which two of these items are provided, which are shared between the routers that run HSRP ?() (choose two)AShared single interfaceBIP AddressCTCP-based hello packetsDMAC address

单选题Layer 3 (the network layer) provides connectivity and path selection between two host systems that may be located on geographically separated networks. Which two devices operate at the network layer?()A applicationB hubC switchD bridgeE router

多选题Which two are uses of NAT?()Aenabling network migrationsBconserving public IP addressesCallowing stateful packet inspectionDpreventing unauthorized connections from outside the network

多选题Which two benefits does VoFR provide? ()Abandwidth efficiencyBcell-switchingCcongestion notificationDheterogeneous network

多选题Which two are characteristics of the IS -IS protocol but not OSPF?()Aforms adjacencies with all neighborsBsupports demand circuit routingCprovides routing support for multiple network layer protocolsDutilizes SPF algorithmEprovides for network scalability by allowing the network to be separated into areasFthree layers of hierarchical routing

多选题In which two locations in an enterprise network can an IPS sensor be placed?()Abridging VLANs on two switchesBbridging two VLANs on one switchCbetween two Layer 2 devices withtrunkingDbetween two Layer 2 devices withouttrunkingEbetween a Layer 2 device and a Layer 3 device withtrunking

多选题In which two locations in an enterprise network can an IPS sensor be placed?()Abridging VLANs on two switchesBbridging two VLANs on one switchCbetween two Layer 2 devices with trunkingDbetween two Layer 2 devices without trunkingEbetween a Layer 2 device and a Layer 3 device with trunking

多选题Which two devices can interfere with the operation of a wireless network because they operate on similar frequencies? (Choose two.)()AcopierBmicrowave ovenCtoasterDcordless phoneEIP phoneFAM radio