网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
Which two types of attacks are considered to be denial of service?() (Choose two.)
A
zombie agents
B
SYN flood
C
IP packet fragments
D
WinNuke
参考答案
参考解析
解析:
暂无解析
更多 “多选题Which two types of attacks are considered to be denial of service?() (Choose two.)Azombie agentsBSYN floodCIP packet fragmentsDWinNuke” 相关考题
考题
Which two types of attacks are considered to be denial of service?() (Choose two.)
A. zombie agentsB. SYN floodC. IP packet fragmentsD. WinNuke
考题
Which two benefits does the Juniper DX provide?() (Choose two.)
A. It compresses all images.B. It protects servers from DDoS attacks.C. It protects servers from SynFlood attacks.D. It loads all content from web servers to flash.
考题
Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.)
A. rate limiting of ICMPB. RADIUS authorizationsC. source address validationD. stateful firewall on the router
考题
An RSVP session is maintained with the periodic exchange of which two message types?() (Choose two.)
A.pathB.resvC.sessionD.keepalive
考题
Which two policy actions are considered flow control actions?()
A.rejectB.community addC.next termD.next policy
考题
Which two of these multicast deployments are most susceptible to attacks from unknown sources?()
A.ASMB.BiDirPIMC.PIM-SMRPD.RP-SwitchoverE.SourceSpecificMulticast
考题
Which two of these multicast deployments are most susceptible to attacks from unknown sources?()A、ASMB、BiDirPIMC、PIM-SMRPD、RP-SwitchoverE、SourceSpecificMulticast
考题
In a RSTP implementation, which of the following two link types are used? ()(Choose two.)A、SharedB、Point-to-PointC、DesignatedD、Multiaccess non-broadcast
考题
What are two benefits of control plane policing?()A、protection against denial of service (DoS) attacks at infrastructure routers and switchesB、 protection against known worm attacks in routers and switchesC、quality of service (QoS) control for packets that are sourced from the data plane of Cisco routers and switchesD、quality of service control (QoS) for packets that are destined to the control plane of Cisco routers and switchesE、quality of service (QoS) control for packets that are destined to the data plane of Cisco routers and switches
考题
Which two of these multicast deployments are most susceptible to attacks from unknown sources?()A、 ASMB、 BiDir PIMC、 PIM-SM RPD、 RP-SwitchoverE、 Source Specific Multicast
考题
Which two benefits does the Juniper DX provide?() (Choose two.)A、It compresses all images.B、It protects servers from DDoS attacks.C、It protects servers from SynFlood attacks.D、It loads all content from web servers to flash.
考题
Which two statistical data types are available on the statistics page of the WebUI? ()(Choose two.)A、cache statisticsB、client browser typeC、server response timeD、HTTP response codes
考题
Which two traffic types trigger pass-through firewall user authentication?()A、SSHB、TelnetC、ICMPD、OSPFE、HTTP
考题
Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()A、It can be used to block bulk encryption attacksB、It can be used to protect against denial of service attacksC、Traffic originating from the router is considered trusted, so it is not inspectedD、Based upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanentlyE、Temporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session
考题
Observe the following options carefully, which two attacks focus on RSA? ()A、BPA attackB、Adaptive chosen ciphertext attackC、DDoS attackD、Man-in-the-middle attack
考题
Which of the following media types is considered a solid state?()A、Thumb driveB、DVD driveC、Blu-Ray driveD、IDE FDD
考题
多选题Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.)Arate limiting of ICMPBRADIUS authorizationsCsource address validationDstateful firewall on the router
考题
多选题Which two of these multicast deployments are most susceptible to attacks from unknown sources?()AASMBBiDir PIMCPIM-SM RPDRP-SwitchoverESource Specific Multicast
考题
多选题Which two policy actions are considered flow control actions?()ArejectBcommunity addCnext termDnext policy
考题
多选题Which two of these multicast deployments are most susceptible to attacks from unknown sources?()AASMBBiDirPIMCPIM-SMRPDRP-SwitchoverESourceSpecificMulticast
考题
多选题Which two loopback types are supported for serial interfaces on Juniper devices?()ALocalBFar EndCRemoteDBidirectional
考题
多选题What are two benefits of control plane policing?()Aprotection against denial of service (DoS) attacks at infrastructure routers and switchesBprotection against known worm attacks in routers and switchesCquality of service (QoS) control for packets that are sourced from the data plane of Cisco routers and switchesDquality of service control (QoS) for packets that are destined to the control plane of Cisco routers and switchesEquality of service (QoS) control for packets that are destined to the data plane of Cisco routers and switches
考题
多选题Which two traffic types trigger pass-through firewall user authentication?()ASSHBTelnetCICMPDOSPFEHTTP
考题
多选题Which two types of nodes are included in an MPLS explicit route? ()(Choose two.)ApeerBstrictClooseDsystem
考题
多选题The Cisco SDM will create a QoS policy that provides services to two types of traffic. Which two statements indicate the default QoS parameters that are created by SDM?()ABusiness-critical traffic will be sorted into two QoS classes.BReal-time traffic will be sorted into one QoS class.CVoice traffic will be considered real-time traffic while call signaling will be considered business-critical.DAll traffic except real-time will be considered best-effort.ERouting, management, and transactional traffic will be considered business-critical.FVoice and call signaling traffic will be considered real-time.
考题
多选题Which two benefits does the Juniper DX provide?() (Choose two.)AIt compresses all images.BIt protects servers from DDoS attacks.CIt protects servers from SynFlood attacks.DIt loads all content from web servers to flash.
考题
多选题An RSVP session is maintained with the periodic exchange of which two message types?() (Choose two.)ApathBresvCsessionDkeepalive
热门标签
最新试卷