Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?() A.denial of serviceB.brute forceC.reconnaissanceD.Trojan horse

Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()

A.denial of service

B.brute force

C.reconnaissance

D.Trojan horse


相关考题:

Which IDP policy action closes the connection and sends an RST packet to both the client and the server?() A. close-connectionB. terminate-connectionC. close-client-and-serverD. terminate-session

Once the TCP connection is established, which message type initiates the BGP peering process?() A. OpenB. ActiveC. UpdateD. Notification

Which Packet Flow Acceleration feature is most effective for short-lived TCP sessions?() A. Active Flow PipeliningB. Fast Connection SetupC. TCP Acceleration (AFP)D. Forward Error Correction

A user opens a webpage that requires the transmission of packets from the Web server to the client‘s browser. The packets transmitted from the Web server to the client exceed the smallest MTU value on the communications path.Which two protocol functions allow this type of communication?()A. packet segmentationB. serialized checkingC. packet sequencingD. parallel checking

Which of the following network topologies is characterized by a central server and uniqueconnections to all clients? () A.StarB.BusC.MeshD.Ring

A user reports being occasionally disconnected from the server. Which of the following tools couldthe technician use to determine if it is the client or the server that is dropping the connection?() A. Packet snifferB. MultimeterC. Load balancerD. Throughput tester

Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server()。 A.denial of serviceB.brute forceC.reconnaissanceD.Trojan horse

A user opens a webpage that requires the transmission of packets from the Web server to the client's browser. The packets transmitted from the Web server to the client exceed the smallest MTU value on the communications path. Which two protocol functions allow this type of communication?()A、packet segmentationB、serialized checkingC、packet sequencingD、parallel checking

Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()A、close-connectionB、terminate-connectionC、close-client-and-serverD、terminate-session

When running IP SLA, which application type should be used if you want to know round-trip delay, jitter, and packet loss for the full path?()A、ICMP path echoB、UDP echoC、ICMP path jitterD、Application Performance MonitorE、TCP connect

What are two reasons for packet loss on a VoIP connection?()A、serialization delayB、overrunC、full buffers and queuesD、propagation delayE、shaping delayF、TCP header errors

Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server()。A、denial of serviceB、brute forceC、reconnaissanceD、Trojan horse

A web server is running correctly but sending a RST packet to any client trying to connect using HTTP on TCP port 80. Which of the following tools should be used to determine the listening port of the web server?()A、RouteB、IfconfigC、NetstatD、Nslookup

A user reports being occasionally disconnected from the server. Which of the following tools couldthe technician use to determine if it is the client or the server that is dropping the connection?()A、Packet snifferB、MultimeterC、Load balancerD、Throughput tester

Which of the following network topologies is characterized by a central server and uniqueconnections to all clients? ()A、StarB、BusC、MeshD、Ring

Which Packet Flow Acceleration feature is most effective for short-lived TCP sessions?()A、Active Flow PipeliningB、Fast Connection SetupC、TCP Acceleration (AFP)D、Forward Error Correction

Once the TCP connection is established, which message type initiates the BGP peering process?()A、OpenB、ActiveC、UpdateD、KeepaliveE、Notification

Your company has a server that runs Windows Server 2008 R2. The server is configured as a remoteaccess server. The external firewall has TCP port 80 and TCP port 443 open for remoteconnections. You have a home computer that runs Windows 7. You need to establish secure remote accessconnection from the home computer to the remote access server.  Which type of connection should you configure? ()A、IPSECB、L2TPC、PPTPD、SSTP

You are creating a shared Internet connection on your Windows 2000 Professional computer.  You want to enable other computers on the LAN to be able to access only HTTP and FTP sites on the Internet.   What should you do?()A、Configure your shared Internet connection to disable LCP extensions.B、Configure you shared Internet connection to disable on-demand dialing.C、Create an Internet Connection Sharing application type for HTTP to use remote server port 25.D、Create an Internet Connection Sharing application type for HTTP to use remote server port 80.E、Create an Internet Connection Sharing application type for FTP to use remote server port 21.F、Create an Internet Connection Sharing application type for FTP to use remote server port 72.

多选题You are creating a shared Internet connection on your Windows 2000 Professional computer.  You want to enable other computers on the LAN to be able to access only HTTP and FTP sites on the Internet.   What should you do?()AConfigure your shared Internet connection to disable LCP extensions.BConfigure you shared Internet connection to disable on-demand dialing.CCreate an Internet Connection Sharing application type for HTTP to use remote server port 25.DCreate an Internet Connection Sharing application type for HTTP to use remote server port 80.ECreate an Internet Connection Sharing application type for FTP to use remote server port 21.FCreate an Internet Connection Sharing application type for FTP to use remote server port 72.

单选题An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()ADoSBSYN floodCport scanningDIP address sweep

单选题How would you characterize the source and type in a denial of service attack on a router?()ABy perfornubg a show ip interface to see the type and source of the attack based upon the access-listmatchesBBy performing a show interface to see the transmitted load txload and receive load rxload ;if the interface utilization is not maxed out ,there is no attack underwayCBy setting up an access-list to permit all ICMP,TCP,and UDP traffic with the log or log-input commands,then use the show access-list and show log commands to determine the type and sourceof attackDBy applying an access-list to all incoming and outgoing interfaces,turning off route-cache on all interfaces,then,when telnetting into the router perform a debug IP packet detail

单选题Once the TCP connection is established, which message type initiates the BGP peering process?()AOpenBActiveCUpdateDKeepaliveENotification

单选题Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()Aclose-connectionBterminate-connectionCclose-client-and-serverDterminate-session

单选题You are the network administrator for Company.  You configure an L2TP virtual private network (VPN) connection on your Windows 2000 Professional computer to remotely access Company’s Windows 2000 Routing and Remote Access server. The server is configured to accept a limited number of both PPTP and L2TP connections. You configure the VPN connection to use MS-CHAP v2 only and to require encryption. You also configure TCP/IP to obtain an IP address automatically. Many times when you try to connect, you are unable to because all of the ports are in use. Other times you are able to connect successfully.   You want to increase your chances of being able to connect to the server while ensuring that the most secure connection type available is used.   What should you do? ()AEnable the VPN connection to use MS-CHAP.BSpecify a TCP/IP address in the Network properties.CChange the data encryption setting to Optional Encryption.DConfigure the Type of VPN server I am calling to be Automatic.EConfigure the Type of VPN server I am calling to be PPTP.

单选题Which Packet Flow Acceleration feature is most effective for short-lived TCP sessions?()AActive Flow PipeliningBFast Connection SetupCTCP Acceleration (AFP)DForward Error Correction

单选题Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()Adenial of serviceBbrute forceCreconnaissanceDTrojan horse