单选题A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?()APhishingBSmurf attackCDenial of serviceDMan-in-the-middle

单选题
A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?()
A

Phishing

B

Smurf attack

C

Denial of service

D

Man-in-the-middle


参考解析

解析: 暂无解析

相关考题:

单选题Office A is located 500 miles (805 kilometers) away from Office B, yet they are on the same private network. Which of the following is MOST likely being used to accomplish this scenario?()ATrunkingBLANCVPNDPeer to peer

单选题After testing a new 100BaseTX cable, the technician determines that only pairs 4, 5, 7, and 8 are straight-thru wires. Which of the following MOST likely describes this cable type?()ACrossover cable with open pairsBCrossover cableCRollover cableDStraight-thru cable with open pairs

单选题Which of the following is the MOST likely authentication scheme used in 802.1x?()ACHAPBRADIUSCTACACS+DKerberos

单选题Which of the following protocols is used to encrypt data between web servers and web browsers?()ASMTPBSIPCHTTPDSSL

单选题A technician is reporting wireless transmission speeds of 300Mbps. Which of the following wireless standards is being used?()A802.11aB802.11bC802.11gD802.11n

单选题Which of the following ports does POP3 services use, by default?()A25B110C143D443

单选题Which of the following analyzes the entire subnet to identify all hosts that are active?()APing sweepBPacket snifferCTracerouteDPort scanner

单选题Which of the following is required if ports from VLANs on two separate switches need to broadcastto each other?()APort mirroringBVPNCTrunkingDPort authentication