Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server()。 A.denial of serviceB.brute forceC.reconnaissanceD.Trojan horse

Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server()。

A.denial of service

B.brute force

C.reconnaissance

D.Trojan horse


相关考题:

Once the TCP connection is established, which message type initiates the BGP peering process?() A. OpenB. ActiveC. UpdateD. Notification

A user opens a webpage that requires the transmission of packets from the Web server to the client‘s browser. The packets transmitted from the Web server to the client exceed the smallest MTU value on the communications path.Which two protocol functions allow this type of communication?()A. packet segmentationB. serialized checkingC. packet sequencingD. parallel checking

Which of the following network topologies is characterized by a central server and uniqueconnections to all clients? () A.StarB.BusC.MeshD.Ring

For the accompanying router output, which of the following statements describes the stat e that neighbor 172.16.254.3 is in?() A. The router will not accept connections from the peer.B. BGP can exchange routing information in this state.C. The router is listening on its server port for connection requests from the peer.D. The router ha s sent out an active TCP connection request to the peer.

Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?() A.denial of serviceB.brute forceC.reconnaissanceD.Trojan horse

Which three statements are true about the data traffic characteristics of voice traffic? ()A、latency must be kept below 150 msB、latency is not a concern as long as jitter is kept below 30 msC、voice packets do not require a specific type of queuingD、voice packets are rather smallE、voice packets require TCP for rapid retransmission of dropped packetsF、voice packets require a fairly constant bandwidth reserved for voice control traffic as well as forthe voice payload

Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()A、denial of serviceB、brute forceC、reconnaissanceD、Trojan horse

A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()A、All traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewableB、Clients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patternsC、All traffic is redirected to the VLAN that the attacker used to flood the CAM tableD、All traffic is flooded out all ports and an attacker is able to capture all dataE、None of the other alternatives apply

OSPFv3 is used to route which type of packets?()A、IPv4B、IPv6C、MPLSD、IS-IS

A user opens a webpage that requires the transmission of packets from the Web server to the client's browser. The packets transmitted from the Web server to the client exceed the smallest MTU value on the communications path. Which two protocol functions allow this type of communication?()A、packet segmentationB、serialized checkingC、packet sequencingD、parallel checking

Which type of connection must be established before BGP peers can exchange update messages?()A、SSLB、UDPC、TCPD、SSH

Which statement is true about a Smurf attack?()A、It sends ping requests in segments of an invalid sizeB、It intercepts the third step in a TCP three-way handshake to hijack a sessionC、It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemD、It uses Trojan horse applications to create a distributed collection of "zombie" computers, which can beused to launch a coordinated DDoS attack

Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server()。A、denial of serviceB、brute forceC、reconnaissanceD、Trojan horse

Interface congestion is causing drops in voice packets and TCP packets. The drops result in jerky speech quality and slower FTP traffic flows. Which two technologies would proactively address the TCP transfer rate and the voice problems?()A、CBWFQB、LLQC、traffic shapingD、WRED

Which two statements about MPLS Label Distribution Protocol (LDP) are true? ()A、LDP hello packets are sent to TCP 646.B、LDP session packets are sent to TCP 646.C、LDP session packets are sent to TCP 711.D、LDP hello packets are sent to TCP 711.E、LDP hello packets are sent to UDP 711.F、LDP hello packets are sent to UDP 646.

Which of the following network topologies is characterized by a central server and uniqueconnections to all clients? ()A、StarB、BusC、MeshD、Ring

Once the TCP connection is established, which message type initiates the BGP peering process?()A、OpenB、ActiveC、UpdateD、Notification

An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()A、DoSB、SYN floodC、port scanningD、IP address sweep

Once the TCP connection is established, which message type initiates the BGP peering process?()A、OpenB、ActiveC、UpdateD、KeepaliveE、Notification

Your company has a server that runs Windows Server 2008 R2. The server is configured as a remoteaccess server. The external firewall has TCP port 80 and TCP port 443 open for remoteconnections. You have a home computer that runs Windows 7. You need to establish secure remote accessconnection from the home computer to the remote access server.  Which type of connection should you configure? ()A、IPSECB、L2TPC、PPTPD、SSTP

You are creating a shared Internet connection on your Windows 2000 Professional computer.  You want to enable other computers on the LAN to be able to access only HTTP and FTP sites on the Internet.   What should you do?()A、Configure your shared Internet connection to disable LCP extensions.B、Configure you shared Internet connection to disable on-demand dialing.C、Create an Internet Connection Sharing application type for HTTP to use remote server port 25.D、Create an Internet Connection Sharing application type for HTTP to use remote server port 80.E、Create an Internet Connection Sharing application type for FTP to use remote server port 21.F、Create an Internet Connection Sharing application type for FTP to use remote server port 72.

You are the network administrator for Company.  You configure an L2TP virtual private network (VPN) connection on your Windows 2000 Professional computer to remotely access Company’s Windows 2000 Routing and Remote Access server. The server is configured to accept a limited number of both PPTP and L2TP connections. You configure the VPN connection to use MS-CHAP v2 only and to require encryption. You also configure TCP/IP to obtain an IP address automatically. Many times when you try to connect, you are unable to because all of the ports are in use. Other times you are able to connect successfully.   You want to increase your chances of being able to connect to the server while ensuring that the most secure connection type available is used.   What should you do? ()A、Enable the VPN connection to use MS-CHAP.B、Specify a TCP/IP address in the Network properties.C、Change the data encryption setting to Optional Encryption.D、Configure the Type of VPN server I am calling to be Automatic.E、Configure the Type of VPN server I am calling to be PPTP.

多选题You are creating a shared Internet connection on your Windows 2000 Professional computer.  You want to enable other computers on the LAN to be able to access only HTTP and FTP sites on the Internet.   What should you do?()AConfigure your shared Internet connection to disable LCP extensions.BConfigure you shared Internet connection to disable on-demand dialing.CCreate an Internet Connection Sharing application type for HTTP to use remote server port 25.DCreate an Internet Connection Sharing application type for HTTP to use remote server port 80.ECreate an Internet Connection Sharing application type for FTP to use remote server port 21.FCreate an Internet Connection Sharing application type for FTP to use remote server port 72.

多选题Which three statements are true about the data traffic characteristics of voice traffic? ()Alatency must be kept below 150 msBlatency is not a concern as long as jitter is kept below 30 msCvoice packets do not require a specific type of queuingDvoice packets are rather smallEvoice packets require TCP for rapid retransmission of dropped packetsFvoice packets require a fairly constant bandwidth reserved for voice control traffic as well as forthe voice payload

单选题OSPFv3 is used to route which type of packets?()AIPv4BIPv6CMPLSDIS-IS

单选题Which statement is true about a Smurf attack?()AIt sends ping requests in segments of an invalid sizeBIt intercepts the third step in a TCP three-way handshake to hijack a sessionCIt sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemDIt uses Trojan horse applications to create a distributed collection of zombie computers, which can beused to launch a coordinated DDoS attack

多选题Which two statements about MPLS Label Distribution Protocol (LDP) are true? ()ALDP hello packets are sent to TCP 646.BLDP session packets are sent to TCP 646.CLDP session packets are sent to TCP 711.DLDP hello packets are sent to TCP 711.ELDP hello packets are sent to UDP 711.FLDP hello packets are sent to UDP 646.