网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()
A

DoS

B

SYN flood

C

port scanning

D

IP address sweep


参考答案

参考解析
解析: 暂无解析
更多 “单选题An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()A DoSB SYN floodC port scanningD IP address sweep” 相关考题
考题 Which two types of attacks are considered to be denial of service?() (Choose two.) A. zombie agentsB. SYN floodC. IP packet fragmentsD. WinNuke

考题 Which parameters are valid SCREEN options for combating operating system probes?() A. syn-fin, syn-flood, and tcp-no-fragB. syn-fin, port-scan, and tcp-no-flagC. syn-fin, fin-no-ack, and tcp-no-fragD. syn-fin, syn-ack-ack-proxy, and tcp-no-frag

考题 For which network anomaly does Junos provide a SCREEN?() A. a telnet to port 80B. a TCP packet with the SYN and ACK flags setC. an SNMP getnext requestD. an ICMP packet larger than 1024 bytes

考题 On which destination port in the Layer 4 header does BGP listen?() A. UDP port 169B. TCP port 169C. UDP port 179D. TCP port 179

考题 TCP/IP的通信过程是?()A、——SYN/ACK——,——ACK,——SYN/ACK——B、——SYN/ACK——,——SYN/ACK——,——ACK——C、——SYN——,——ACK,——SYN——,——ACK——D、——SYN——,——SYN/ACK——,——ACK——

考题 Which of the following descriptions about IP spoofing is correct?()A、IP source address is forgedB、IP destination address is forgedC、IP TCP source port is forgedD、IP TCP destination port is forgedE、None of above

考题 NBAR supports all of these with the exception of which one?()A、HTTPB、IP multicastC、TCP flows with dynamically assigned port numbersD、non-UDP protocols

考题 Interface ge-0/0/2.0 of your router is attached to the Internet and is configured with an IP address and network mask of 71.33.252.17/24. A host with IP address 10.20.20.1 is running an HTTP service on TCP port 8080. This host isattached to the ge-0/0/0.0 interface of your router. You must use interface-based static NAT to make the HTTP service on the host reachable from the Internet. On which IP address and TCP port can Internet hosts reach the HTTP service?()A、IP address 10.10.10.1 and TCP port 8080B、IP address 71.33.252.17 and TCP port 80C、IP address 71.33.251.19 and TCP port 80D、IP address 71.33.252.19 and TCP port 8080

考题 For which network anomaly does Junos provide a SCREEN?()A、a telnet to port 80B、a TCP packet with the SYN and ACK flags setC、an SNMP getnext requestD、an ICMP packet larger than 1024 bytes

考题 Nmap工具不可以执行下列哪种方式扫描()。A、目录遍历扫描B、TCP SYN扫描C、TCP connect扫描D、UDP port扫描

考题 下面利用TCP的三次握手原理进行的攻击是()。A、IP欺骗B、SYN FloodC、Sumrf攻击D、Land攻击

考题 To initiate testing,  which port does a Cisco IOS IP SLA source use to send a control message to an IP SLA responder? ()A、UDP port 2020B、UDP port 1967C、TCP port 2020D、ICMP port 1967

考题 How doTCP SYN attacks take advantage ofTCPto prevent new connections from being established to a host under attack?()A、These attacks send multiple FIN segments forcing TCP connection release.B、These attacks fill up a hosts’ listen queue by failing to ACK partially openedTCPconnections.C、These attacks take advantage of the hosts transmit backoff algorithm by sending jam signals to the host.D、These attacks increment the ISN of each segment by a random number causing constant TCP retransmissions.E、These attacks send TCP RST segments in response toconnection SYN+ACK segments forcing SYN retransmissions.

考题 Which of the following would an attacker use to footprint a system?()A、RADIUSB、Password crackerC、Port scannerD、Man-in-the-middle attack

考题 Which parameters must you select when configuring operating system probes SCREEN options?()A、syn-fin, syn-flood, and tcp-no-fragB、syn-fin, port-scan, and tcp-no-flagC、syn-fin, fin-no-ack, and tcp-no-fragD、syn-fin, syn-ack-ack-proxy, and tcp-no-frag

考题 Which two types of attacks are considered to be denial of service?() (Choose two.)A、zombie agentsB、SYN floodC、IP packet fragmentsD、WinNuke

考题 Which parameters are valid SCREEN options for combating operating system probes?()A、syn-fin, syn-flood, and tcp-no-fragB、syn-fin, port-scan, and tcp-no-flagC、syn-fin, fin-no-ack, and tcp-no-fragD、syn-fin, syn-ack-ack-proxy, and tcp-no-frag

考题 An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()A、DoSB、SYN floodC、port scanningD、IP address sweep

考题 On which destination port in the Layer 4 header does BGP listen?()A、UDP port 169B、TCP port 169C、UDP port 179D、TCP port 179

考题 单选题Interface ge-0/0/2.0 of your device is attached to the Internet and is configured with an IP address andnetwork mask of 71.33.252.17/24. A webserver with IP address 10.20.20.1 isrunning an HTTP service on TCP port 8080. The webserver is attached to the ge-0/0/0.0 interface of yourdevice. You must use NAT to make the webserver reachable from the Internet using port translation.Which type of NAT must you configure?()A source NAT with address shiftingB pool-based source NATC static destination NATD pool-based destination NAT

考题 单选题Which of the following descriptions about IP spoofing is correct?()A IP source address is forgedB IP destination address is forgedC IP TCP source port is forgedD IP TCP destination port is forgedE None of above

考题 单选题For which network anomaly does Junos provide a SCREEN?()A a telnet to port 80B a TCP packet with the SYN and ACK flags setC an SNMP getnext requestD an ICMP packet larger than 1024 bytes

考题 单选题How doTCP SYN attacks take advantage ofTCPto prevent new connections from being established to a host under attack?()A These attacks send multiple FIN segments forcing TCP connection release.B These attacks fill up a hosts’ listen queue by failing to ACK partially openedTCPconnections.C These attacks take advantage of the hosts transmit backoff algorithm by sending jam signals to the host.D These attacks increment the ISN of each segment by a random number causing constant TCP retransmissions.E These attacks send TCP RST segments in response toconnection SYN+ACK segments forcing SYN retransmissions.

考题 单选题To initiate testing,  which port does a Cisco IOS IP SLA source use to send a control message to an IP SLA responder? ()A UDP port 2020B UDP port 1967C TCP port 2020D ICMP port 1967

考题 单选题Which parameters are valid SCREEN options for combating operating system probes?()A syn-fin, syn-flood, and tcp-no-fragB syn-fin, port-scan, and tcp-no-flagC syn-fin, fin-no-ack, and tcp-no-fragD syn-fin, syn-ack-ack-proxy, and tcp-no-frag

考题 单选题Interface ge-0/0/2.0 of your router is attached to the Internet and is configured with an IP address and network mask of 71.33.252.17/24. A host with IP address 10.20.20.1 is running an HTTP service on TCP port 8080. This host isattached to the ge-0/0/0.0 interface of your router. You must use interface-based static NAT to make the HTTP service on the host reachable from the Internet. On which IP address and TCP port can Internet hosts reach the HTTP service?()A IP address 10.10.10.1 and TCP port 8080B IP address 71.33.252.17 and TCP port 80C IP address 71.33.251.19 and TCP port 80D IP address 71.33.252.19 and TCP port 8080

考题 单选题Which parameters must you select when configuring operating system probes SCREEN options?()A syn-fin, syn-flood, and tcp-no-fragB syn-fin, port-scan, and tcp-no-flagC syn-fin, fin-no-ack, and tcp-no-fragD syn-fin, syn-ack-ack-proxy, and tcp-no-frag