网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()
A

DoS

B

SYN flood

C

port scanning

D

IP address sweep


参考答案

参考解析
解析: 暂无解析
更多 “单选题An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()A DoSB SYN floodC port scanningD IP address sweep” 相关考题
考题 ()是最基本的TCP扫描技术。A、TCP connect()扫描B、TCP SYN扫描C、TCP FIN扫描D、TCP反向ident扫描

考题 You have 100 segments in the USERS tablespace. You realize that the USERS tablespace is running low on space. You can use Segment Advisor to()。 A. identify the segments that you should shrinkB. modify the storage parameters for the tablespaceC. automatically shrink the segments with unused spaceD. check the alerts generated for the tablespace that is running low on space

考题 ICMP is often used in troubleshooting and verifying network. What statements are true regarding ICMP packets? (Choose two)A. They acknowledge receipt of TCP segments.B. They guarantee datagram delivery.C. They can provide hosts with information about network problems.D. They are encapsulated within IP datagrams.E. They are encapsulated within UDP datagrams.F. They are encapsulated within TCP datagrams.

考题 Which parameters are valid SCREEN options for combating operating system probes?() A. syn-fin, syn-flood, and tcp-no-fragB. syn-fin, port-scan, and tcp-no-flagC. syn-fin, fin-no-ack, and tcp-no-fragD. syn-fin, syn-ack-ack-proxy, and tcp-no-frag

考题 Which parameters must you select when configuring operating system probes SCREEN options?() A. syn-fin, syn-flood, and tcp-no-fragB. syn-fin, port-scan, and tcp-no-flagC. syn-fin, fin-no-ack, and tcp-no-fragD. syn-fin, syn-ack-ack-proxy, and tcp-no-frag

考题 TCP三次握手的过程是?() A.SYN,SYN,ACKB.SYN,SYN/ACK,ACKC.SYN,ACK,ACKD.SYN,ACK,SYN

考题 TCP端口全扫描方式,扫描、被扫描端口(开放)间的会话过程()。 A.SYN-SYN+ACK-ACK-ACK+FINB.SYN-SYN+ACK-RSTC.SYN-ACK+RSTD.SYN-SYN+ACK-ACK+FIN

考题 TCP会话通过( )次握手来建立连接。其中第一次握手:源主机发送一个同步标志位SYN=( )的TCP数据段。源主机进入( )状态。A.SYN-SENT B.SYN-RCVD C.ESTABLISHED D.CLOSE-WAIT

考题 TCP/IP的通信过程是?()A、——SYN/ACK——,——ACK,——SYN/ACK——B、——SYN/ACK——,——SYN/ACK——,——ACK——C、——SYN——,——ACK,——SYN——,——ACK——D、——SYN——,——SYN/ACK——,——ACK——

考题 Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()A、Attacker sends multiple DHCP requests flooding DHCP serverB、Attacker connects rogue server initiating DHCP requestsC、Attacker connects rogue server replying to DHCP requestsD、Attacker sends DHCP jam signal causing DHCP server to crashE、Attacker sends gratuitous ARP replies, thereby jamming the DHCP serverF、Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server

考题 Although TCP segments differ from UDP segments, they both contain some common fields. What two segments do they share in common?()A、source addressB、optionsC、sequence numberD、sourcesE、destination portF、checksum

考题 Rate your level of proficiency with implementing, managing, and troubleshooting network protocols and services, including TCP/IP protocol, dial-up networking, Internet Information Services (IIS), remote desktop, and Internet connection firewalls.()A、Very HighB、HighC、ModerateD、LowE、Very Low

考题 Which parameters are valid SCREEN options for combating operating system probes?()A、syn-fin, syn-flood, and tcp-no-fragB、syn-fin, port-scan, and tcp-no-flagC、syn-fin, fin-no-ack, and tcp-no-fragD、syn-fin, syn-ack-ack-proxy, and tcp-no-frag

考题 以下关于SecPath防火墙syn-Flood攻击防御技术,描述正确的是()。A、基于TCP半开连接数限制方法防范SYN Flood攻击B、基于TCP新建连接速率限制方法防范SYN Flood攻击C、利用SYN Cookie技术防范SYN Flood攻击D、通过利用Safe Reset技术防范SYN Flood攻击

考题 Which statement is true about a Smurf attack?()A、It sends ping requests in segments of an invalid sizeB、It intercepts the third step in a TCP three-way handshake to hijack a sessionC、It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemD、It uses Trojan horse applications to create a distributed collection of "zombie" computers, which can beused to launch a coordinated DDoS attack

考题 How doTCP SYN attacks take advantage ofTCPto prevent new connections from being established to a host under attack?()A、These attacks send multiple FIN segments forcing TCP connection release.B、These attacks fill up a hosts’ listen queue by failing to ACK partially openedTCPconnections.C、These attacks take advantage of the hosts transmit backoff algorithm by sending jam signals to the host.D、These attacks increment the ISN of each segment by a random number causing constant TCP retransmissions.E、These attacks send TCP RST segments in response toconnection SYN+ACK segments forcing SYN retransmissions.

考题 What statements are true regarding ICMP packets?()A、They acknowledge receipt of TCP segments.B、They guarantee datagram delivery.C、They can provide hosts with information about network problems.D、They are encapsulated within IP datagrams.E、They are encapsulated within UDP datagrams.

考题 An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()A、DoSB、SYN floodC、port scanningD、IP address sweep

考题 TCP端口全扫描方式,扫描、被扫描端口(开放)间的会话过程()。A、SYN-SYN+ACK-ACK-ACK+FINB、SYN-SYN+ACK-RSTC、SYN-ACK+RSTD、SYN-SYN+ACK-ACK+FIN

考题 TCP链接连接正常的标志是()。A、SYN_SENTB、SYN_RCVDC、ESTABLISHEDD、CONNECTED

考题 单选题You have 100 segments in the USERS tablespace. You realize that the USERS tablespace is running low on space. You can use Segment Advisor to().A add data files to the tablespace B identify the segments that you should shrink C modify the storage parameters for the tablespace D automatically shrink the segments with unused space E check the alerts generated for the tablespace that is running low on space

考题 单选题You have 100 segments in the USERS tablespace. You realize that the USERS tablespace is running low on space. You can use Segment Advisor to()。A identify the segments that you should shrinkB modify the storage parameters for the tablespaceC automatically shrink the segments with unused spaceD check the alerts generated for the tablespace that is running low on space

考题 多选题What statements are true regarding ICMP packets?()AThey acknowledge receipt of TCP segments.BThey guarantee datagram delivery.CThey can provide hosts with information about network problems.DThey are encapsulated within IP datagrams.EThey are encapsulated within UDP datagrams.

考题 单选题Rate your level of proficiency with implementing, managing, and troubleshooting network protocols and services, including TCP/IP protocol, dial-up networking, Internet Information Services (IIS), remote desktop, and Internet connection firewalls.()A Very HighB HighC ModerateD LowE Very Low

考题 单选题How doTCP SYN attacks take advantage ofTCPto prevent new connections from being established to a host under attack?()A These attacks send multiple FIN segments forcing TCP connection release.B These attacks fill up a hosts’ listen queue by failing to ACK partially openedTCPconnections.C These attacks take advantage of the hosts transmit backoff algorithm by sending jam signals to the host.D These attacks increment the ISN of each segment by a random number causing constant TCP retransmissions.E These attacks send TCP RST segments in response toconnection SYN+ACK segments forcing SYN retransmissions.

考题 单选题Which statement is true about a Smurf attack?()A It sends ping requests in segments of an invalid sizeB It intercepts the third step in a TCP three-way handshake to hijack a sessionC It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemD It uses Trojan horse applications to create a distributed collection of zombie computers, which can beused to launch a coordinated DDoS attack

考题 多选题Although TCP segments differ from UDP segments, they both contain some common fields. What two segments do they share in common?()Asource addressBoptionsCsequence numberDsourcesEdestination portFchecksum