单选题A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()AIt enables an attacker to perform an IP sweep of devices.BIt enables a hacker to know which operating system the system is running.CIt can overflow the session table to its limit, which can result in rejection of legitimate traffic.DIt creates a ping of death and can cause the entire network to be infected with a virus.

单选题
A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()
A

It enables an attacker to perform an IP sweep of devices.

B

It enables a hacker to know which operating system the system is running.

C

It can overflow the session table to its limit, which can result in rejection of legitimate traffic.

D

It creates a ping of death and can cause the entire network to be infected with a virus.


参考解析

解析: 暂无解析

相关考题:

DOS的英文表示是()。 A、Disk、Operating、SystemB、Daily、Operating、SystemC、Disk、Open、SystemD、Date、Open、System

OSI参考模型中的OSI表示的是()。A.Organization Standard InstituteB.Organization Standard Inter connectionC.Open System InternetD.Open System Inter connection

A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?() A. It enables an attacker to perform an IP sweep of devices.B. It enables a hacker to know which operating system the system is running.C. It can overflow the session table to its limit, which can result in rejection of legitimate traffic.D. It creates a ping of death and can cause the entire network to be infected with a virus.

An antivirus program (1) a virus by searching code recognized as that of one of the thousands of viruses known to afflict computer systems. An antivirus Program also can be used to create a checksum for (2) files on your disk, save the checksums in a special file, and then use the checksums to (3) whether files have been modified perhaps by a new virus. Special terminate and stay resident (TSR) programs can check for unusual (4) to access vital disk areas and system f11es, and check files you copy into memory to be sure they are not (5) .A.declaresB.deductsC.defeatsD.detects

Which of the following statements is NOT true?()AThe open field system provided a good opportunity to experiment.BThe open field system wasted land.CThe open field system was wasteful of labor and time.DThe open field system made livestock farming difficult.

Which of the following statements is NOT true?()A、The open field system provided a good opportunity to experiment.B、The open field system wasted land.C、The open field system was wasteful of labor and time.D、The open field system made livestock farming difficult.

An administrator has added a new device to a system and wants to determine if it has been correctly added to the ODM database. Which command would the system administrator use?()A、odmgetB、odmaddC、odmshowD、odmcreate

在网络体系结构中,OSI表示()A、Open System InterconnectionB、Open System InformationC、Operating System InterconnectionD、Operating System Information

OSI参考模型中的OSI表示的是()A、Organization Standard InstituteB、Organization Standard InterconnectionC、Open System InternetD、Open System Interconnection

The df command indicates that a filesystem is full, however, the du command indicates that not all space is allocated.  How would the system administrator isolate the discrepancy()A、Use the fuser command to identify deleted but open files.B、Use the ipcs command to view orphan shared memory segments.C、Use the defrag command to determine if the filesystem is fragmented.D、Use the topas command to identify processes using the most system resources.

A system administrator issued the errpt command and had no results. The system administrator determined that error logging was turned off. Which of the following commands should be used to start logging system errors?()A、/usr/bin/errmsgB、/usr/lib/errdemonC、/usr/lib/errloggerD、/usr/bin/errinstall

Which command can a system administrator use to verify that a tape is in backup format and is readable by the system?()A、tarB、tctlC、tcopyD、restore

A system administrator has just finished upgrading a system to AIX 5.2. If there are future problems, the system administrator would like to add an entry to the AIX errorlog to record this event. Which of the following commands can be issued for this purpose?()A、/usr/bin/errmsg "System upgraded to AIX 5.2"B、/usr/bin/errlog "System upgraded to AIX 5.2"C、/usr/bin/errupdate "System upgraded to AIX 5.2"D、/usr/bin/errlogger "System upgraded to AIX 5.2"

How does a system administrator add a new user to a system?()A、mkuserB、cruserC、adduserD、edit /etc/password

A system administrator is attempting to unmount filesystem /dev/data and receives the following message:   umount: 0506-349 Cannot unmount /dev/data: The requested resource is busy.   Which of the following commands can be used to determine which process has open references within the filesystem?()A、lsfsB、topasC、fuserD、mount

Which of the following outputs will best indicate if a system is CPU bound?()A、 %idle  10% B、 %usr + %sys  80% C、 %sys + %wio  80% D、 %wio + %idle  80%

A system administrator is monitoring a system that has recently shown a decrease in performance.The administrator suspects that the system may be low on memory and may be paging excessively.Which of the following commands is best to identify a possible paging problem?()A、iostatB、netstatC、psD、vmstat

A system administrator is installing a C compiler on a system. According to the compiler’s documenation, the AIX fileset bos.adt.lib must be installed prior to installation of the compiler. Which command would the system administrator use to verify installation of the bos.adt.lib fileset?()A、installpB、instfixC、lsallqD、lslpp

You work as a database administrator at Certkiller .com. In your production database, you observe that users’ transactions are consuming a lot of resource and you plan to impose resource restrictions by using Resource Manager. For which three resources can you enable usage restrictions by using Resource Manager? ()A、 CPU usageB、 degree of parallelismC、 number of open cursorsD、 number of sorts performedE、 idle time for blocking sessionsF、 number of disk I/O operations performedG、 number of memory I/O operations performed

对于IIS日志文件的访问权限,下列哪些设置是正确的?()A、SYSTEM(完全控制)Administrator(完全控制)Users(修改)B、SYSTEM(完全控制)Administrator(完全控制)Everyone(读取和运行)C、SYSTEM(完全控制)Administrator(完全控制)Inernet来宾账户(读取和运行)D、SYSTEM(完全控制)Administrator(完全控制)

单选题Purging air from a hydraulic system is necessary when()Aadding small amounts of oil to the systemBthe system has been overheatedCthe system has been drained and then filled with new oilDthe system has been idle for a long period of time

单选题Which of the following statements is NOT true?()AThe open field system provided a good opportunity to experiment.BThe open field system wasted land.CThe open field system was wasteful of labor and time.DThe open field system made livestock farming difficult.

单选题When it is necessary to open a refrigeration system for repairs and the system will be open for more than a few minutes, the open ends of the system should be ().AdehydratedBpurgedCpluggedDevacuated

单选题You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()AControl Panel  Data Sources (ODBC).BControl Panel  System Tools  Shared Folders.CComputer Management  System Tools  System Information.DComputer Management  System Tools  Shared Folders  Open Files.EComputer Management  System Tools  Shared Folders  Sessions.FComputer Management  System Tools  Shared Folders  Shares.

单选题A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()AIt enables an attacker to perform an IP sweep of devices.BIt enables a hacker to know which operating system the system is running.CIt can overflow the session table to its limit, which can result in rejection of legitimate traffic.DIt creates a ping of death and can cause the entire network to be infected with a virus.

单选题As an alternative to the conventional seawater cooling system, is based on principles about cooler locations, ()flow control and preheating, but with a central cooler and one additional set of pumps().Athe central cooling system, differentBthe central cooling system, the sameCthe open cooling system, differentDthe open cooling system, the same

单选题Which of the following outputs will best indicate if a system is CPU bound?()A %idle  10% B %usr + %sys  80% C %sys + %wio  80% D %wio + %idle  80%

单选题A system administrator has filesystems that should not be mounted during system startup. How can the system administrator prevent the /data filesystem from being mounted during subsequent boots?()Amount -no /dataBchfs -A no /dataCmount -t nfs /dataDchfs -a type=nfs /data