网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()
A
DoS
B
SYN flood
C
port scanning
D
IP address sweep
参考答案
参考解析
解析:
暂无解析
更多 “单选题An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()A DoSB SYN floodC port scanningD IP address sweep” 相关考题
考题
Which two types of attacks are considered to be denial of service?() (Choose two.)
A. zombie agentsB. SYN floodC. IP packet fragmentsD. WinNuke
考题
Which parameters are valid SCREEN options for combating operating system probes?()
A. syn-fin, syn-flood, and tcp-no-fragB. syn-fin, port-scan, and tcp-no-flagC. syn-fin, fin-no-ack, and tcp-no-fragD. syn-fin, syn-ack-ack-proxy, and tcp-no-frag
考题
For which network anomaly does Junos provide a SCREEN?()
A. a telnet to port 80B. a TCP packet with the SYN and ACK flags setC. an SNMP getnext requestD. an ICMP packet larger than 1024 bytes
考题
On which destination port in the Layer 4 header does BGP listen?()
A. UDP port 169B. TCP port 169C. UDP port 179D. TCP port 179
考题
TCP/IP的通信过程是?()A、——SYN/ACK——,——ACK,——SYN/ACK——B、——SYN/ACK——,——SYN/ACK——,——ACK——C、——SYN——,——ACK,——SYN——,——ACK——D、——SYN——,——SYN/ACK——,——ACK——
考题
Which of the following descriptions about IP spoofing is correct?()A、IP source address is forgedB、IP destination address is forgedC、IP TCP source port is forgedD、IP TCP destination port is forgedE、None of above
考题
NBAR supports all of these with the exception of which one?()A、HTTPB、IP multicastC、TCP flows with dynamically assigned port numbersD、non-UDP protocols
考题
Interface ge-0/0/2.0 of your router is attached to the Internet and is configured with an IP address and network mask of 71.33.252.17/24. A host with IP address 10.20.20.1 is running an HTTP service on TCP port 8080. This host isattached to the ge-0/0/0.0 interface of your router. You must use interface-based static NAT to make the HTTP service on the host reachable from the Internet. On which IP address and TCP port can Internet hosts reach the HTTP service?()A、IP address 10.10.10.1 and TCP port 8080B、IP address 71.33.252.17 and TCP port 80C、IP address 71.33.251.19 and TCP port 80D、IP address 71.33.252.19 and TCP port 8080
考题
For which network anomaly does Junos provide a SCREEN?()A、a telnet to port 80B、a TCP packet with the SYN and ACK flags setC、an SNMP getnext requestD、an ICMP packet larger than 1024 bytes
考题
To initiate testing, which port does a Cisco IOS IP SLA source use to send a control message to an IP SLA responder? ()A、UDP port 2020B、UDP port 1967C、TCP port 2020D、ICMP port 1967
考题
How doTCP SYN attacks take advantage ofTCPto prevent new connections from being established to a host under attack?()A、These attacks send multiple FIN segments forcing TCP connection release.B、These attacks fill up a hosts’ listen queue by failing to ACK partially openedTCPconnections.C、These attacks take advantage of the hosts transmit backoff algorithm by sending jam signals to the host.D、These attacks increment the ISN of each segment by a random number causing constant TCP retransmissions.E、These attacks send TCP RST segments in response toconnection SYN+ACK segments forcing SYN retransmissions.
考题
Which of the following would an attacker use to footprint a system?()A、RADIUSB、Password crackerC、Port scannerD、Man-in-the-middle attack
考题
Which parameters must you select when configuring operating system probes SCREEN options?()A、syn-fin, syn-flood, and tcp-no-fragB、syn-fin, port-scan, and tcp-no-flagC、syn-fin, fin-no-ack, and tcp-no-fragD、syn-fin, syn-ack-ack-proxy, and tcp-no-frag
考题
Which two types of attacks are considered to be denial of service?() (Choose two.)A、zombie agentsB、SYN floodC、IP packet fragmentsD、WinNuke
考题
Which parameters are valid SCREEN options for combating operating system probes?()A、syn-fin, syn-flood, and tcp-no-fragB、syn-fin, port-scan, and tcp-no-flagC、syn-fin, fin-no-ack, and tcp-no-fragD、syn-fin, syn-ack-ack-proxy, and tcp-no-frag
考题
An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()A、DoSB、SYN floodC、port scanningD、IP address sweep
考题
On which destination port in the Layer 4 header does BGP listen?()A、UDP port 169B、TCP port 169C、UDP port 179D、TCP port 179
考题
单选题Interface ge-0/0/2.0 of your device is attached to the Internet and is configured with an IP address andnetwork mask of 71.33.252.17/24. A webserver with IP address 10.20.20.1 isrunning an HTTP service on TCP port 8080. The webserver is attached to the ge-0/0/0.0 interface of yourdevice. You must use NAT to make the webserver reachable from the Internet using port translation.Which type of NAT must you configure?()A
source NAT with address shiftingB
pool-based source NATC
static destination NATD
pool-based destination NAT
考题
单选题Which of the following descriptions about IP spoofing is correct?()A
IP source address is forgedB
IP destination address is forgedC
IP TCP source port is forgedD
IP TCP destination port is forgedE
None of above
考题
单选题For which network anomaly does Junos provide a SCREEN?()A
a telnet to port 80B
a TCP packet with the SYN and ACK flags setC
an SNMP getnext requestD
an ICMP packet larger than 1024 bytes
考题
单选题How doTCP SYN attacks take advantage ofTCPto prevent new connections from being established to a host under attack?()A
These attacks send multiple FIN segments forcing TCP connection release.B
These attacks fill up a hosts’ listen queue by failing to ACK partially openedTCPconnections.C
These attacks take advantage of the hosts transmit backoff algorithm by sending jam signals to the host.D
These attacks increment the ISN of each segment by a random number causing constant TCP retransmissions.E
These attacks send TCP RST segments in response toconnection SYN+ACK segments forcing SYN retransmissions.
考题
单选题To initiate testing, which port does a Cisco IOS IP SLA source use to send a control message to an IP SLA responder? ()A
UDP port 2020B
UDP port 1967C
TCP port 2020D
ICMP port 1967
考题
单选题Which parameters are valid SCREEN options for combating operating system probes?()A
syn-fin, syn-flood, and tcp-no-fragB
syn-fin, port-scan, and tcp-no-flagC
syn-fin, fin-no-ack, and tcp-no-fragD
syn-fin, syn-ack-ack-proxy, and tcp-no-frag
考题
单选题Interface ge-0/0/2.0 of your router is attached to the Internet and is configured with an IP address and network mask of 71.33.252.17/24. A host with IP address 10.20.20.1 is running an HTTP service on TCP port 8080. This host isattached to the ge-0/0/0.0 interface of your router. You must use interface-based static NAT to make the HTTP service on the host reachable from the Internet. On which IP address and TCP port can Internet hosts reach the HTTP service?()A
IP address 10.10.10.1 and TCP port 8080B
IP address 71.33.252.17 and TCP port 80C
IP address 71.33.251.19 and TCP port 80D
IP address 71.33.252.19 and TCP port 8080
考题
单选题Which parameters must you select when configuring operating system probes SCREEN options?()A
syn-fin, syn-flood, and tcp-no-fragB
syn-fin, port-scan, and tcp-no-flagC
syn-fin, fin-no-ack, and tcp-no-fragD
syn-fin, syn-ack-ack-proxy, and tcp-no-frag
热门标签
最新试卷