Which type of attacks can be monitored and mitigated by CS-MARS using NetFlow data?()A、 Man-in-themiddle attackB、 Spoof attackC、 Land.C attackD、 Buffer OverflowE、 Day zero attackF、 Trojan Horse
Which type of attacks can be monitored and mitigated by CS-MARS using NetFlow data?()
- A、 Man-in-themiddle attack
- B、 Spoof attack
- C、 Land.C attack
- D、 Buffer Overflow
- E、 Day zero attack
- F、 Trojan Horse
相关考题:
Which of the following security mitigation techniques is the MOST effective against zero-day attacks?() A.Update antivirus definitionsB.MAC filteringC.Effective security policiesD.User awareness training
How can Cisco NetFlow be used to aid in the operation and troubleshooting of QoS issues? () A. NetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.B. NetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.C. NetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.D. NetFlow can be configured to identify voice and video traffic flows and place them into a lowlatency queue for expedited processing.
Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?() A.denial of serviceB.brute forceC.reconnaissanceD.Trojan horse
Which two are correct functions of the Cisco Anomaly Guard and Detector for preventing DDOS attacks? ()A、 uses Netflow data for anomaly detectionsB、 builds baseline profilesof normal operating conditions, enablingrapid identification of unusual activity that indicates an attackC、 accept events inputs from different network devicesvia syslog, SDEE and SNMPD、 dynamic diversion redirects and cleans only traffic destined for targeted devices, allowing unaffectedtraffic toflow freely and ensuring business continuityE、 pushes ACLs to network devices to only block the malicious trafficF、 using topology and configuration awareness, events from different devices are correlatedand attacks mitgitations are performed at the optimal location
Cisco IOS NetFlow gathers data that can be used in which three of these? ()A、 accountingB、 authenticationC、 authorizationD、 network monitoringE、 network planning
Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()A、Update antivirus definitionsB、MAC filteringC、Effective security policiesD、User awareness training
Which Cisco security software product mitigates Day Zero attacks on desktops and servers - stopping known and unknown attacks without requiring reconfigurations or updates on the endpoints?()A、 Cisco Secure Desktop (CSD)B、 NAC Appliance Agent (NAA)C、 Cisco SecurityAgent (CSA)D、 SSLVPN Client (SVC)E、 Cisco TrustAgent (CTA)
Which four statements about NetFlow are true?()A、NetFlow records bidirectional IP traffic flow.B、NetFlow export can be implemented over IPv4.C、NetFlow export can be implemented over IPv6.D、NetFlow records multicast IP traffic flow.E、NetFlow records ingress traffic.F、NetFlow records egress traffic.
As an experienced network administrator, you are asked to troubleshoot a QoS problem. In which way might the Cisco NetFlow be helpful during the troubleshooting process?()A、NetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.B、NetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.C、NetFlow can be configured to identify voice and video traffic flows and place them into a low-latency queue for expedited processing.D、NetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.
BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate whatclassification of attack?()A、Sniffing attackB、Denial of service attackC、Port Scan attackD、Reconnaisance attackE、Spoofing attack
Which statement is true about a Smurf attack?()A、It sends ping requests in segments of an invalid sizeB、It intercepts the third step in a TCP three-way handshake to hijack a sessionC、It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemD、It uses Trojan horse applications to create a distributed collection of "zombie" computers, which can beused to launch a coordinated DDoS attack
What are four methods used by hackers? ()A、footprint analysis attackB、privilege escalation attackC、buffer Unicode attackD、social engineering attackE、front door attacksF、Trojan horse attack
Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server()。A、denial of serviceB、brute forceC、reconnaissanceD、Trojan horse
Which statement is correct regarding NBAR and NetFlow?()A、NetFlow uses five key fields for the flowB、NBAR examines data in Layers 3 and 4C、NetFlow examines data in Layers 3 and 4D、NBAR examines data in Layers 2 through 4E、NetFlow examines data in Layers 2 through 4
Observe the following options carefully, which two attacks focus on RSA? ()A、BPA attackB、Adaptive chosen ciphertext attackC、DDoS attackD、Man-in-the-middle attack
If a user attempts to go to a website and notices the URL has changed, which of the following attacks is MOST likely the cause?()A、DLL injectionB、DDoS attackC、DNS poisoningD、ARP poisoning
When using IBM Tivoli Monitoring Universal Agents monitors, which three IBM Tivoli Workload Scheduler processes can be monitored by default? ()A、 reptrB、 writerC、 netmanD、 monmanE、 batchmanF、 appservman
The WebSphere Application Server provides a Dynamic Cache Monitor. Which of the following can be monitored using this tool?()A、Servlet Response TimesB、Cache StatisticsC、Database Connection Pool StatisticsD、Disk Statistics
Which two data types can be converted to LOBs using an ALTER TABLE… MODIFY command?()A、RAWB、LONGC、VARCHARD、LONG RAW
Which three statements are true regarding single-row functions?()A、 They can accept only one argument.B、 They can be nested up to only two levels.C、 They can return multiple values of more than one data type.D、 They can be used in SELECT, WHERE, and ORDER BY clauses. E、 They can modify the data type of the argument that is referenced.F、 They can accept a column name, expression, variable name, or a user-supplied constant as arguments.
Which three statements are true regarding the data types in Oracle Database 10g/11g?()A、Only one LONG column can be used per table B、A TIMESTAMP data type column stores only time values with fractional seconds C、The BLOB data type column is used to store binary data in an operating system file D、The minimum column width that can be specified for a VARCHAR2 data type column is one E、The value for a CHAR data type column is blank-padded to the maximum defined column width
多选题When using IBM Tivoli Monitoring Universal Agents monitors, which three IBM Tivoli Workload Scheduler processes can be monitored by default? ()AreptrBwriterCnetmanDmonmanEbatchmanFappservman
多选题Which three statements are true regarding the data types in Oracle Database 10g/11g?()AOnly one LONG column can be used per tableBA TIMESTAMP data type column stores only time values with fractional secondsCThe BLOB data type column is used to store binary data in an operating system fileDThe minimum column width that can be specified for a VARCHAR2 data type column is oneEThe value for a CHAR data type column is blank-padded to the maximum defined column width
单选题Which statement is true about a Smurf attack?()AIt sends ping requests in segments of an invalid sizeBIt intercepts the third step in a TCP three-way handshake to hijack a sessionCIt sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemDIt uses Trojan horse applications to create a distributed collection of zombie computers, which can beused to launch a coordinated DDoS attack
单选题Which type of attacks can be monitored and mitigated by CS-MARS using NetFlow data?()A Man-in-themiddle attackB Spoof attackC Land.C attackD Buffer OverflowE Day zero attackF Trojan Horse
多选题Cisco IOS NetFlow gathers data that can be used in which three of these? ()AaccountingBauthenticationCauthorizationDnetwork monitoringEnetwork planning
单选题Which Cisco security software product mitigates Day Zero attacks on desktops and servers - stopping known and unknown attacks without requiring reconfigurations or updates on the endpoints?()A Cisco Secure Desktop (CSD)B NAC Appliance Agent (NAA)C Cisco SecurityAgent (CSA)D SSLVPN Client (SVC)E Cisco TrustAgent (CTA)