网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
IP Spoofing的防范措施是()。
- A、查路由表,观察其出口是否合法
- B、反查路由表,观察其出口是否合法
- C、反查路由表,观察其入口与昀佳出接口是否相同
参考答案
更多 “IP Spoofing的防范措施是()。A、查路由表,观察其出口是否合法B、反查路由表,观察其出口是否合法C、反查路由表,观察其入口与昀佳出接口是否相同” 相关考题
考题
中间人攻击或IP/MAC Spoofing攻击都会导致信息泄露等危害,且在内网中比较常见。为了防止中间人攻击或IP/MAC Spoofing攻击,可以采取的配置方法有:()
A.配置Trusted/Untrusted接口。B.限制交换机接口上允许学习到的最多MAC地址数目。C.开启DHCP snooping检查DHCP REQUEST报文中CHADDR字段的功能。D.在交换机上配置DHCP snooping与DAI或IPSG进行联动。
考题
利用IP数据包中的一个选项IP Source Routing来指定路由,利用可信用户对服务器进行攻击,这种攻击是()A、源路由选择欺骗(Source Routing Spoofing )B、IP欺骗(IP Spoofing)C、DNS欺骗(DNS Spoofing).D、TCP序列号欺骗
考题
Which of the following is the most effective technique to prevent source IPAddress spoofing?()A、 policy based routing (PBR)B、 unicast reverse path forwarding (uRPF)C、 lock and keyACLD、 RFC 1918filteringE、 IP source routing
考题
Which of the following descriptions about IP spoofing is correct?()A、IP source address is forgedB、IP destination address is forgedC、IP TCP source port is forgedD、IP TCP destination port is forgedE、None of above
考题
Which two network attack statements are true?()A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.B、Access attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.C、DoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.D、DoS attacks can consist of IP spoofing and DDoS attacks.E、IP spoofing can be reduced through the use of policy-based routing.F、IP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.
考题
The Company security administrator wants to prevent DHCP spoofing. Which statement is true about DHCP spoofing operation?()A、 DHCP spoofing and SPAN cannot be used on the same port of a switch.B、 To prevent a DHCP spoofing, the DHCP server must create a static ARP entry that cannot be updated by a dynamic ARP packet.C、 To prevent a DHCP spoofing, the switch must have DHCP server services disabled and a static entry pointing towards the DHCP server.D、 DHCP spoofing can be prevented by placing all unused ports in an unused VLAN.E、 None of the other alternatives apply.
考题
When implementing best practices for IP Source Address Spoofing and Defeating Denial of Service Attacks with IP SourceAddress Spoofing, what RFC is commonly usedto protect your network?()A、 RFC 1149B、 RFC 3704C、 RFC 1918D、 RFC 2827
考题
目前,SecPath防火墙系列中,下列哪些攻击防范在路由模式下支持,而透明模式下不支持?()A、arp‐reverse‐query(ARP反向查询)B、ip‐spoofing(IP欺骗)C、arp‐spoofing(ARP欺骗)D、land(Land攻击)
考题
You are responsible for increasing the security within the Company LAN. Of the following choices listed below, which is true regarding layer 2 security and mitigation techniques? ()A、 Enable root guard to mitigate ARP address spoofing attacks.B、 Configure DHCP spoofing to mitigate ARP address spoofing attacks.C、 Configure PVLANs to mitigate MAC address flooding attacks.D、 Enable root guard to mitigate DHCP spoofing attacks.E、 Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted ports.F、 Configure port security to mitigate MAC address flooding G、 None of the other alternatives apply
考题
目前,SecPath防火墙系列中,下列哪些攻击防范在路由模式下支持,而透明模式下不支持?()A、arp-reverse-query(ARP反向查询)B、ip-spoofing(IP欺骗)C、arp-spoofing(ARP欺骗)D、land(Land攻击)
考题
Which of the following IOS features can prevent IP spoofing attacks?()A、PPP over EthernetB、Cisco Express forwardingC、MPLS traffic EngineeringD、IS-IS routingE、Unicast Reverse Path Forwarding(uRPF)
考题
单选题利用IP数据包中的一个选项IP Source Routing来指定路由,利用可信用户对服务器进行攻击,这种攻击是()A
源路由选择欺骗(Source Routing Spoofing )B
IP欺骗(IP Spoofing)C
DNS欺骗(DNS Spoofing).D
TCP序列号欺骗
考题
单选题Which of the following is the most effective technique to prevent source IPAddress spoofing?()A
policy based routing (PBR)B
unicast reverse path forwarding (uRPF)C
lock and keyACLD
RFC 1918filteringE
IP source routing
考题
单选题Which of the following descriptions about IP spoofing is correct?()A
IP source address is forgedB
IP destination address is forgedC
IP TCP source port is forgedD
IP TCP destination port is forgedE
None of above
考题
单选题When implementing best practices for IP Source Address Spoofing and Defeating Denial of Service Attacks with IP SourceAddress Spoofing, what RFC is commonly usedto protect your network?()A
RFC 1149B
RFC 3704C
RFC 1918D
RFC 2827
考题
多选题目前,SecPath防火墙系列中,下列哪些攻击防范在路由模式下支持,而透明模式下不支持?()Aarp-reverse-query(ARP反向查询)Bip-spoofing(IP欺骗)Carp-spoofing(ARP欺骗)Dland(Land攻击)
考题
单选题中间人攻击或IP/MAC Spoofing攻击会导致信息泄露等危害,在内网中比较常见,为了防止中间人攻击或IP/MAC Spoofing攻击,可以采取的方法有()。A
配置Trusted/Untrusted接口B
限制交换机接口上允许学习到的最多MAC地址数目C
使用DHCP Snooping检查DHCP REQUEST报文中CHADDR字段的功能D
在交换机上配置DHCP Snooping功能
热门标签
最新试卷