网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network. Which description correctly describes a MAC address flooding attack?()
- A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
- B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
- C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.
- D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.
- E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
- F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
- G、None of the other alternatives apply
参考答案
更多 “ You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network. Which description correctly describes a MAC address flooding attack?()A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G、None of the other alternatives apply” 相关考题
考题
__________you suspect something, I may as well tell you the whole truth.A. SinceB. UntilC. AfterD. While
考题
You are unable to telnet to a router at address 203.125.12.1 from a workstation with the IP address 203.125.12.23. You suspect that there is a problem with the IP protocol stack in your PC. Which of the following actions is most likely to confirm your diagnosis?A. ping 127.0.0.0B. ping 203.125.12.1C. telnet 127.0.0.1D. ping 127.0.0.1E. tracert 203.125.12.1F. None of the above
考题
If you suspect a diesel engine is misfiring due to air leakage into the fuel system, you should begin looking for the leak at theA.fuel line connections to the cylinder injection valvesB.gasket surfaces of the fuel oil filtersC.discharge fittings of the fuel injector pumpsD.suction side of the fuel oil transfer pump
考题
You are the network administrator for . You administer a Windows Server 2003 computer named TestKing7. Users report that they experience poor performance when they access resources located on TestKing7. You suspect a disk bottleneck. You need to set up performance counters to monitor TestKing7.You need to decide which performance objects to monitor.Which two counters should you choose? ()(Each correct answer presents part of the solution. Select two.)A.LogicalDisk\%IdleTimeB.PhysicalDisk\%DiskTimeC.PhysicalDisk\Avg.DiskQueueLengthD.Memory\WriteCopies/secE.Memory\CommitLimit
考题
While testing a cargo tank,your oxygen indicator reads 25% oxygen in the tank. You would then ______.A.enter the tank safelyB.suspect the accuracy of the readingC.ventilate the tankD.test for nitrogen
考题
suspect.E01和suspect.001是从某嫌疑人硬盘中创建的两个证据镜像,鉴定人希望证明这两个镜像文件的哈希值是相同的。以下()文件包含Raw(dd)image的哈希值。A、Suspect.001.txtB、suspect.001.csvC、suspect.E01.csvD、suspect.E01.txt
考题
While troubleshooting a network connectivity issue, you suspect that a router may be missing a route, or may be receiving bad routing information to a destination. What command should you issue to view the route that the router will use to reach a given destination?()A、pingB、traceC、show ip routeD、show interfaceE、show cdp neighbors
考题
You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis. How would you achieve this?()A、by using triggersB、by using external tablesC、by using anonymous PL/SQL blocksD、by auditing all DML operations on the table
考题
You work as a database administrator for Supportcenter.cn. In a production environment, users complain about the slow response time when accessing the database. You have not optimized the memory usage of the Oracle instance and you suspect the problem to be with the memory. To which type of object would you refer to determine the cause of the slow response?()A、The trace fileB、The fixed viewsC、The data dictionary viewsD、The operating system log fieldsE、The dynamic performance views.
考题
You find that the execution time of reports in your datawarehouse application is significantly high. You suspect the lack of indexes to be the reason for the degradation in performance. Which advisory component would you refer to, in order to determine the appropriate indexes?() A、Memory AdvisorB、Segment AdvisorC、SQL Access AdvisorD、Automatic Workload Repository (AWR)E、Automatic Database Diagnostic Monitor (ADDM)
考题
You are the network administrator for . You administer a Windows Server 2003 computer named TestKing7. Users report that they experience poor performance when they access resources located on TestKing7. You suspect a disk bottleneck. You need to set up performance counters to monitor TestKing7. You need to decide which performance objects to monitor. Which two counters should you choose? ()(Each correct answer presents part of the solution. Select two.)A、LogicalDisk/%IdleTimeB、PhysicalDisk/%DiskTimeC、PhysicalDisk/Avg.DiskQueueLengthD、Memory/WriteCopies/secE、Memory/CommitLimit
考题
单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis. How would you achieve this()A
by using triggersB
by using Data PumpC
by using external tablesD
by using anonymous PL/SQL blocks
考题
单选题You work as a database administrator for Certkiller .com. You find that reports are running for a long time in your data warehousing applications. You suspect a lack of indexes is the reason for the performance degradation. Which advisory component would you refer to, in order to determine the appropriate indexes?()A
Memory AdvisorsB
Segment AdvisorsC
SQL Tuning and Access AdvisorsD
Automated Workload Repository (AWR)E
Automatic Database Diagnostic Monitor (ADDM)
考题
单选题If fuel tank levels are found to have increased after a grounding, you should suspect ().A
a damaged pneumercator lineB
a puncture, crack, or hole in the skin of the vesselC
improper record keeping of fuel transfer activitiesD
contamination of the contaminated steam supply system
考题
单选题You are unable to telnet to a router at address 203.125.12.1 from a workstation with the IP address 203.125.12.23. You suspect that there is a problem with your protocol stack. Which of the following actions is most likely to confirm your diagnosis?()A
ping 127.0.0.0B
ping 203.125.12.1C
telnet 127.0.0.1D
ping 127.0.0.1E
tracert 203.125.12.1
考题
单选题If a diesel engine is difficult to start and operates with the engine temperatures lower than normal, you should suspect that the ().A
compression pressures are below normalB
lube oil is diluted with fuel oilC
cranking speed is too lowD
exhaust system is partially restricted
考题
单选题Some users report they cannot receive messages from some external senders.You suspect that there is some anti-spam activity blocking those messages.You need to identify what is blocking the messages.You will activate and review the logs of one of the following:()A
Protocol loggingB
Connectivity logsC
Message trackingD
Pipeline tracing
考题
单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis. How would you achieve this?()A
by using triggersB
by using external tablesC
by using anonymous PL/SQL blocksD
by auditing all DML operations on the table
考题
单选题If the water level dropped rapidly in the expansion tank of a closed diesel engine cooling water system, you should suspect a ().A
loss of suction in the circulating pumpB
leak in the primary cooling systemC
broken raw water pump shaftD
burned or cracked piston in one cylinder
考题
单选题You manage a SQL Server 2005 database that contains a table with many indexes. You notice that data modification performance has degraded over time. You suspect that some of the indexes are unused. You need to identify which indexes were not used by any queries since the last time SQL Server 2005 started. Which dynamic management view should you use?()A
sys.dm fts index populationB
sys.dm exec query statsC
sys. dm db index usage statsD
sys.dm db index physical stats
考题
单选题You find that the execution time of reports in your datawarehouse application is significantly high. You suspect the lack of indexes to be the reason for the degradation in performance. Which advisory component would you refer to, in order to determine the appropriate indexes?()A
Memory AdvisorB
Segment AdvisorC
SQL Access AdvisorD
Automatic Workload Repository (AWR)E
Automatic Database Diagnostic Monitor (ADDM)
考题
单选题If an auxiliary diesel engine temperature is higher than normal ,but the thermostat is determined not to be defective you would suspect a /an ()A
cavitation erosion in the water jacketsB
excess corrosion inhibitor in the coolantC
dirty jacket water coolerD
defective turbocharger
考题
单选题A diesel engines crankcase oil level is found to be too high√ You should suspect that ().A
the engine was over filledB
there might be a fuel leakC
there might be a water leakD
all of the above
考题
单选题You work as a database administrator for Supportcenter.cn. In a production environment, users complain about the slow response time when accessing the database. You have not optimized the memory usage of the Oracle instance and you suspect the problem to be with the memory. To which type of object would you refer to determine the cause of the slow response?()A
The trace fileB
The fixed viewsC
The data dictionary viewsD
The operating system log fieldsE
The dynamic performance views.
考题
单选题If you notice smoke coming fro the crankcase exhaust fan outlet of an operating diesel engine, you would suspect()A
a cracked cylinder linerB
clogged intake portsC
broken piston ringsD
a faulty head gasket
考题
单选题If you suspect a diesel engine is misfiring due to air leakage into the fuel system, you should begin looking for the leak at the ()A
fuel line connections to cylinder injection valvesB
gasket surfaces of the fuel oil filtersC
discharge fitting of the fuel injector pumpsD
suction side of the fuel oil tran
考题
单选题While inspecting the main bearings on a diesel engine you find impregnated dirt and scratches in the bearing surface you would, therefore, suspect that ()A
the bearing had been overheatedB
water was present in the oilC
the lube oil was not being properly filteredD
the maximum allowable bearing pressure had been exceeded
考题
单选题You find that the execution time of reports in your datawarehouse application is significantly high. You suspect the lack of indexes to be the reason for the degradation in performance. Which advisory component would you refer to, in order to determine the appropriate indexes?()A
Memory AdvisorB
Segment AdvisorC
SQL Access AdvisorD
Automatic Workload Repository (AWR)E
Automatic Database Diagnostic Monitor (ADDM)
热门标签
最新试卷