单选题A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?()APhishingBSmurf attackCDenial of serviceDMan-in-the-middle
单选题
A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?()
A
Phishing
B
Smurf attack
C
Denial of service
D
Man-in-the-middle
参考解析
解析:
暂无解析
相关考题:
单选题Office A is located 500 miles (805 kilometers) away from Office B, yet they are on the same private network. Which of the following is MOST likely being used to accomplish this scenario?()ATrunkingBLANCVPNDPeer to peer
单选题After testing a new 100BaseTX cable, the technician determines that only pairs 4, 5, 7, and 8 are straight-thru wires. Which of the following MOST likely describes this cable type?()ACrossover cable with open pairsBCrossover cableCRollover cableDStraight-thru cable with open pairs
单选题Which of the following is the MOST likely authentication scheme used in 802.1x?()ACHAPBRADIUSCTACACS+DKerberos
单选题Which of the following protocols is used to encrypt data between web servers and web browsers?()ASMTPBSIPCHTTPDSSL
单选题A technician is reporting wireless transmission speeds of 300Mbps. Which of the following wireless standards is being used?()A802.11aB802.11bC802.11gD802.11n
单选题Which of the following analyzes the entire subnet to identify all hosts that are active?()APing sweepBPacket snifferCTracerouteDPort scanner
单选题Which of the following is required if ports from VLANs on two separate switches need to broadcastto each other?()APort mirroringBVPNCTrunkingDPort authentication