多选题Which two network attack statements are true?()AAccess attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.BAccess attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.CDoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.DDoS attacks can consist of IP spoofing and DDoS attacks.EIP spoofing can be reduced through the use of policy-based routing.FIP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.

多选题
Which two network attack statements are true?()
A

Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.

B

Access attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.

C

DoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.

D

DoS attacks can consist of IP spoofing and DDoS attacks.

E

IP spoofing can be reduced through the use of policy-based routing.

F

IP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.


参考解析

解析: 暂无解析

相关考题:

Which two statements about the use of VLANs to segment a network are true?() A. VLANs increase the size of collision domains.B. VLANs allow logical grouping of users by function.C. VLANs simplify switch administration.D. VLANs enhance network security.

Which two of these statements best describe the benefits of WPAv2? (Choose two.)()A、 SSID broadcast preventionB、 man-in-the-middle attack protectionC、 cost reduction through software upgrades in all existing hardwareD、 dynamic key generationE、 RF jamming prevention

Which two statements about NTP version 4 are true?()A、It supports fast synchronization at starting and before network failuresB、It supports automatic server discoveryC、It uses a fixed-point arithmetionD、It supports the "nanokernel" kernel implementationE、It does not support Public-Key Cryptography

Which two statements about an IDS are true?()A、The IDS is in the traffic path.B、The IDS can send TCP resets to the source device.C、The IDS can send TCP resets to the destination device.D、The IDS listens promiscuously to all traffic on the network.E、Default operation is for the IDS to discard malicious traffic.

Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4? (Choose two.)()A、It establishes a static route to the 172.16.3.0 network.B、It establishes a static route to the 192.168.2.0 network.C、It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network.D、It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4.E、It uses the default administrative distance.F、It is a route that would be used last if other routes to the same destination exist.

Which two statements are true about L2TP tunnels?() (Choose two.)A、Traffic is clear textB、Traffic is encryptedC、They are initiated by the LNSD、They are initiated by the LAC

Which two statements are true about optical networks?()A、SONET and SDH both use time-division multiplexing.B、An optical transport network system uses time-division multiplexing.C、SONET and SDH both use wavelength-division multiplexing.D、An optical transport network system uses wavelength-division multiplexing.

Which two statements are true about the application of QoS in a converged network?()A、end-to-end network delay times that exceed 50 ms for real-time traffic are considered unacceptableB、end-to-end network delay times that exceed 250 ms for real-time traffic are considered unacceptableC、end-to-end network delay is not a factor as long as the  delay is consistentD、some packet loss can be corrected by codec algorithmsE、RSVP handles voice packet retransmissionF、fragmentation is a result of packet loss

Which two statements describe the functions and operations of IDS and IPS systems?()A、A network administrator entering a wrong password would generate a true-negative alarm.B、A false positive alarm is generated when an IDS/IPS signature is correctly identified.C、An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.D、Cisco IDS works inline and stops attacks before they enter the network.E、Cisco IPS taps the network traffic and responds after an attack.F、Profile-based intrusion detection is also known as "anomaly detection".

Which two statements are true about network voice traffic? (Choose two.)()A、 Voice traffic is affected more by link speed than FTP traffic is.B、 Voice traffic is affected more by packet delays than FTP traffic is.C、 Voice streams involve larger packet sizes than most TCP network traffic involves.D、 Voice traffic is more sensitive to packet loss than TCP network traffic is.E、 Voice traffic requires QOS mechanisms only in heavily loaded network segments.

An etwork administrator has enabled OSPF across an NBMA network and has issued the command ip ospf network nonbroadcast. Given those facts, which two statements are true?()A、Interfaces will automatically detect and build adjacencies with neighbor routersB、DR and BDR elections will not occurC、DR and BDR elections will occurD、The neighbor command is required to build adjacenciesE、All routers must be configured in a fully meshed topology with all other routers

Which two statements about the use of VLANs to segment a network are true? ()A、VLANs increase the size of collision domains.B、VLANs allow logical grouping of users by function.C、VLANs simplify switch administration.D、VLANs enhance network security.

Which two statements are true about the implementation of QoS? ()A、 Implementing DiffServ involves the configuration of RSVP.B、 Implementing IntServ allows QoS to be performed by configuring only the ingress and egress devices.C、 Implementing IntServ involves the utilization of RSVP.D、 Traffic should be classified and marked by the core network devices.E、 Traffic should be classified and marked as close to the edge of the network as possible.

Which of the following statements are true?() A、 The equals() method determines if reference values refer to the same object.B、 The == operator determines if the contents and type of two separate objects match.C、 The equals() method returns true only when the contents of two objects match.D、 The class File overrides equals() to return true if the contents and type of two separate objects match.

Which two statements are true of a network mask?()A、A subnet mask specifies the portion of an IP address that is in a binary format.B、A subnet mask specifies the portion of an IP address that is in a decimal format.C、A subnet mask specifies the portion of an IP address that represents a network prefix.D、A subnet mask specifies the portion of an IP address that represents network hosts.

Which two statements are true of a network mask?()A、A subnet mask specifies the portion of an IP address that is in a binary formatB、A subnet mask specifies the portion of an IP address that is in a decimal formatC、A subnet mask specifies the portion of an IP address that represents a network prefixD、A subnet mask specifies the portion of an IP address that represetns network hosts

Which two statements are true regarding L2TP? ()(Choose two.)A、Tunnels are initiated by the LACB、Tunnels are initiated by the LNSC、By default, subscriber authentication occurs on the LNSD、By default, subscriber authentication occurs on the LAC

多选题Which two statements are true about L2TP tunnels?() (Choose two.)ATraffic is clear textBTraffic is encryptedCThey are initiated by the LNSDThey are initiated by the LAC

多选题Which two of these statements best describe the benefits of WPAv2? (Choose two.)()ASSID broadcast preventionBman-in-the-middle attack protectionCcost reduction through software upgrades in all existing hardwareDdynamic key generationERF jamming prevention

多选题Which two statements are true about the application of QoS in a converged network?()Aend-to-end network delay times that exceed 50 ms for real-time traffic are considered unacceptableBend-to-end network delay times that exceed 250 ms for real-time traffic are considered unacceptableCend-to-end network delay is not a factor as long as the  delay is consistentDsome packet loss can be corrected by codec algorithmsERSVP handles voice packet retransmissionFfragmentation is a result of packet loss

多选题Which two statements are true regarding rescue configurations?()AOnce saved, a rescue configuration is loaded using the rollback 0 command.BThe rescue configuration must contain the minimal elements necessary to restore network connectivity.CA minimal rescue configuration is defined by default.DA rescue configuration must include a root password.

多选题Which two statements are true regarding L2TP? ()(Choose two.)ATunnels are initiated by the LACBTunnels are initiated by the LNSCBy default, subscriber authentication occurs on the LNSDBy default, subscriber authentication occurs on the LAC

单选题Which two statements are true of a network mask?()AA subnet mask specifies the portion of an IP address that is in a binary formatBA subnet mask specifies the portion of an IP address that is in a decimal formatCA subnet mask specifies the portion of an IP address that represents a network prefixDA subnet mask specifies the portion of an IP address that represetns network hosts

多选题Which of the following statements are true?()AThe equals() method determines if reference values refer to the same object.BThe == operator determines if the contents and type of two separate objects match.CThe equals() method returns true only when the contents of two objects match.DThe class File overrides equals() to return true if the contents and type of two separate objects match.

多选题Which three statements are true regarding IDP?()AIDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.BIDP inspects traffic up to the Application layer.CIDP searches the data stream for specific attack patterns.DIDP inspects traffic up to the Presentation layer.EIDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.

多选题Which two statements about NTP version 4 are true?()AIt supports fast synchronization at starting and before network failuresBIt supports automatic server discoveryCIt uses a fixed-point arithmetionDIt supports the nanokernel kernel implementationEIt does not support Public-Key Cryptography

多选题Which two statements are true of a network mask?()AA subnet mask specifies the portion of an IP address that is in a binary format.BA subnet mask specifies the portion of an IP address that is in a decimal format.CA subnet mask specifies the portion of an IP address that represents a network prefix.DA subnet mask specifies the portion of an IP address that represents network hosts.

多选题Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4? (Choose two.)()AIt establishes a static route to the 172.16.3.0 network.BIt establishes a static route to the 192.168.2.0 network.CIt configures the router to send any traffic for an unknown destination to the 172.16.3.0 network.DIt configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4.EIt uses the default administrative distance.FIt is a route that would be used last if other routes to the same destination exist.