网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()
A
DoS
B
SYN flood
C
port scanning
D
IP address sweep
参考答案
参考解析
解析:
暂无解析
更多 “单选题An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()A DoSB SYN floodC port scanningD IP address sweep” 相关考题
考题
You have 100 segments in the USERS tablespace. You realize that the USERS tablespace is running low on space. You can use Segment Advisor to()。
A. identify the segments that you should shrinkB. modify the storage parameters for the tablespaceC. automatically shrink the segments with unused spaceD. check the alerts generated for the tablespace that is running low on space
考题
ICMP is often used in troubleshooting and verifying network. What statements are true regarding ICMP packets? (Choose two)A. They acknowledge receipt of TCP segments.B. They guarantee datagram delivery.C. They can provide hosts with information about network problems.D. They are encapsulated within IP datagrams.E. They are encapsulated within UDP datagrams.F. They are encapsulated within TCP datagrams.
考题
Which parameters are valid SCREEN options for combating operating system probes?()
A. syn-fin, syn-flood, and tcp-no-fragB. syn-fin, port-scan, and tcp-no-flagC. syn-fin, fin-no-ack, and tcp-no-fragD. syn-fin, syn-ack-ack-proxy, and tcp-no-frag
考题
Which parameters must you select when configuring operating system probes SCREEN options?()
A. syn-fin, syn-flood, and tcp-no-fragB. syn-fin, port-scan, and tcp-no-flagC. syn-fin, fin-no-ack, and tcp-no-fragD. syn-fin, syn-ack-ack-proxy, and tcp-no-frag
考题
TCP端口全扫描方式,扫描、被扫描端口(开放)间的会话过程()。
A.SYN-SYN+ACK-ACK-ACK+FINB.SYN-SYN+ACK-RSTC.SYN-ACK+RSTD.SYN-SYN+ACK-ACK+FIN
考题
TCP会话通过( )次握手来建立连接。其中第一次握手:源主机发送一个同步标志位SYN=( )的TCP数据段。源主机进入( )状态。A.SYN-SENT
B.SYN-RCVD
C.ESTABLISHED
D.CLOSE-WAIT
考题
TCP/IP的通信过程是?()A、——SYN/ACK——,——ACK,——SYN/ACK——B、——SYN/ACK——,——SYN/ACK——,——ACK——C、——SYN——,——ACK,——SYN——,——ACK——D、——SYN——,——SYN/ACK——,——ACK——
考题
Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()A、Attacker sends multiple DHCP requests flooding DHCP serverB、Attacker connects rogue server initiating DHCP requestsC、Attacker connects rogue server replying to DHCP requestsD、Attacker sends DHCP jam signal causing DHCP server to crashE、Attacker sends gratuitous ARP replies, thereby jamming the DHCP serverF、Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server
考题
Although TCP segments differ from UDP segments, they both contain some common fields. What two segments do they share in common?()A、source addressB、optionsC、sequence numberD、sourcesE、destination portF、checksum
考题
Rate your level of proficiency with implementing, managing, and troubleshooting network protocols and services, including TCP/IP protocol, dial-up networking, Internet Information Services (IIS), remote desktop, and Internet connection firewalls.()A、Very HighB、HighC、ModerateD、LowE、Very Low
考题
Which parameters are valid SCREEN options for combating operating system probes?()A、syn-fin, syn-flood, and tcp-no-fragB、syn-fin, port-scan, and tcp-no-flagC、syn-fin, fin-no-ack, and tcp-no-fragD、syn-fin, syn-ack-ack-proxy, and tcp-no-frag
考题
以下关于SecPath防火墙syn-Flood攻击防御技术,描述正确的是()。A、基于TCP半开连接数限制方法防范SYN Flood攻击B、基于TCP新建连接速率限制方法防范SYN Flood攻击C、利用SYN Cookie技术防范SYN Flood攻击D、通过利用Safe Reset技术防范SYN Flood攻击
考题
Which statement is true about a Smurf attack?()A、It sends ping requests in segments of an invalid sizeB、It intercepts the third step in a TCP three-way handshake to hijack a sessionC、It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemD、It uses Trojan horse applications to create a distributed collection of "zombie" computers, which can beused to launch a coordinated DDoS attack
考题
How doTCP SYN attacks take advantage ofTCPto prevent new connections from being established to a host under attack?()A、These attacks send multiple FIN segments forcing TCP connection release.B、These attacks fill up a hosts’ listen queue by failing to ACK partially openedTCPconnections.C、These attacks take advantage of the hosts transmit backoff algorithm by sending jam signals to the host.D、These attacks increment the ISN of each segment by a random number causing constant TCP retransmissions.E、These attacks send TCP RST segments in response toconnection SYN+ACK segments forcing SYN retransmissions.
考题
What statements are true regarding ICMP packets?()A、They acknowledge receipt of TCP segments.B、They guarantee datagram delivery.C、They can provide hosts with information about network problems.D、They are encapsulated within IP datagrams.E、They are encapsulated within UDP datagrams.
考题
An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()A、DoSB、SYN floodC、port scanningD、IP address sweep
考题
TCP端口全扫描方式,扫描、被扫描端口(开放)间的会话过程()。A、SYN-SYN+ACK-ACK-ACK+FINB、SYN-SYN+ACK-RSTC、SYN-ACK+RSTD、SYN-SYN+ACK-ACK+FIN
考题
单选题You have 100 segments in the USERS tablespace. You realize that the USERS tablespace is running low on space. You can use Segment Advisor to().A
add data files to the tablespace B
identify the segments that you should shrink C
modify the storage parameters for the tablespace D
automatically shrink the segments with unused space E
check the alerts generated for the tablespace that is running low on space
考题
单选题You have 100 segments in the USERS tablespace. You realize that the USERS tablespace is running low on space. You can use Segment Advisor to()。A
identify the segments that you should shrinkB
modify the storage parameters for the tablespaceC
automatically shrink the segments with unused spaceD
check the alerts generated for the tablespace that is running low on space
考题
多选题What statements are true regarding ICMP packets?()AThey acknowledge receipt of TCP segments.BThey guarantee datagram delivery.CThey can provide hosts with information about network problems.DThey are encapsulated within IP datagrams.EThey are encapsulated within UDP datagrams.
考题
单选题Rate your level of proficiency with implementing, managing, and troubleshooting network protocols and services, including TCP/IP protocol, dial-up networking, Internet Information Services (IIS), remote desktop, and Internet connection firewalls.()A
Very HighB
HighC
ModerateD
LowE
Very Low
考题
单选题How doTCP SYN attacks take advantage ofTCPto prevent new connections from being established to a host under attack?()A
These attacks send multiple FIN segments forcing TCP connection release.B
These attacks fill up a hosts’ listen queue by failing to ACK partially openedTCPconnections.C
These attacks take advantage of the hosts transmit backoff algorithm by sending jam signals to the host.D
These attacks increment the ISN of each segment by a random number causing constant TCP retransmissions.E
These attacks send TCP RST segments in response toconnection SYN+ACK segments forcing SYN retransmissions.
考题
单选题Which statement is true about a Smurf attack?()A
It sends ping requests in segments of an invalid sizeB
It intercepts the third step in a TCP three-way handshake to hijack a sessionC
It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemD
It uses Trojan horse applications to create a distributed collection of zombie computers, which can beused to launch a coordinated DDoS attack
考题
多选题Although TCP segments differ from UDP segments, they both contain some common fields. What two segments do they share in common?()Asource addressBoptionsCsequence numberDsourcesEdestination portFchecksum
热门标签
最新试卷