网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Birthday attacks are used against which of the following?()
A
digital signatures
B
symmetric ciphering
C
hashalgoritms
D
asymmetric ciphering
E
digital certificates
参考答案
参考解析
解析:
暂无解析
更多 “单选题Birthday attacks are used against which of the following?()A digital signaturesB symmetric cipheringC hashalgoritmsD asymmetric cipheringE digital certificates” 相关考题
考题
Which of the following is "承兑交单"?A、Bill of exchangeB、Document against acceptanceC、StatementD、Cost price
考题
Which of the following channels, when used in close proximity to one another, provide the BESTprotection against crosstalk?()
A. 1 and 11B. 2 and 10C. 6 and 1D. 6 and 11
考题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS
考题
Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()
A.Update antivirus definitionsB.MAC filteringC.Effective security policiesD.User awareness training
考题
The Company is concerned about Layer 2 security threats. Which statement is true about these threats? ()A、 MAC spoofing attacks allow an attacking device to receive frames intended for a different network host.B、 Port scanners are the most effective defense against dynamic ARP inspection.C、 MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable attack points.D、 Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP snooping attacks.E、 DHCP snooping sends unauthorized replies to DHCP queries.F、 ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.G、 None of the other alternatives apply.
考题
Which of the following statements that describe Diffie Hellman Key exchange are correct? ()A、 A DH key exchange is an algorithm that utilizes asymmetric cryptographic keys.B、 The DH key exchange is used to establish a shared secret over an insecure medium during an IPSec phase 1 exchange.C、 The DH exchange is susceptible to man-in-the-middle attacks.D、 The DH exchange is used to authenticate the peer device duringan IPSec phase 1 exchange.E、A DH exchange provides Perfect Forward Secrecy (PFS).
考题
A customer wants to check whether they have the necessary tools enabled to prevent intrusions andvirus attacks on a Windows Vista workstation. Which of the following tools can be used to display thecurrent configuration? ()A、Security CenterB、Event Viewer Security logC、Windows DefenderD、Windows Firewall
考题
Birthday attacks are used against which of the following?()A、 digital signaturesB、 symmetric cipheringC、 hashalgoritmsD、 asymmetric cipheringE、 digital certificates
考题
Observe the following options carefully, which two attacks focus on RSA? ()A、BPA attackB、Adaptive chosen ciphertext attackC、DDoS attackD、Man-in-the-middle attack
考题
Which of the following channels, when used in close proximity to one another, provide the BESTprotection against crosstalk?()A、1 and 11B、2 and 10C、6 and 1D、6 and 11
考题
Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?()A、DoSB、SmurfC、Man-in-the-middleD、Phishing
考题
Which of the following utilities are used to choose which programs run at startup? ()A、SFCB、SETDEBUGC、MSCONFIGD、REGEDIT
考题
If a user attempts to go to a website and notices the URL has changed, which of the following attacks is MOST likely the cause?()A、DLL injectionB、DDoS attackC、DNS poisoningD、ARP poisoning
考题
A Stateful firewall is MOST useful in protecting against which of the following network scans?()A、PINGB、UDPC、XmasD、ACK
考题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS
考题
Which of the following commands should be used to report statistics on network protocols used by the system?()A、 lsattrB、 pstatC、 netstatD、 ifconfig
考题
单选题Which of the following channels, when used in close proximity to one another, provide the BESTprotection against crosstalk?()A
1 and 11B
2 and 10C
6 and 1D
6 and 11
考题
单选题Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()A
Update antivirus definitionsB
MAC filteringC
Effective security policiesD
User awareness training
考题
单选题A computer’s case fan protects against which of the following environmental concerns?()A
PressureB
HeatC
Brown outD
Cold
考题
单选题Which of the following AIX commands is used to produce an input file that is then used to generate a NIS map file?()A
wdadmB
mrgpwdC
makedbmD
mkpasswd
考题
单选题The Company is concerned about Layer 2 security threats. Which statement is true about these threats? ()A
MAC spoofing attacks allow an attacking device to receive frames intended for a different network host.B
Port scanners are the most effective defense against dynamic ARP inspection.C
MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable attack points.D
Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP snooping attacks.E
DHCP snooping sends unauthorized replies to DHCP queries.F
ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.G
None of the other alternatives apply.
考题
单选题Client exclusion policies are used to mitigate which of the following attacks?()A
dictionaryB
bit-flip and replayC
mac spoofingD
man-in-the-middle
考题
单选题Which of the following chemicals will be used where protection against caustic cracking is required in boiler treatment?()A
Sodium hydroxideB
Sodium carbonateC
Sodium nitrateD
Sodium polyphosphate
考题
多选题Which of the following comparison of Control Plane Policing (CoPP) with Receive ACL(Racl) is correct?()ACoPP protects against IP spoofing;Racl protects against DoS attacks.BCoPP can not use named access lists;Racl can use named access listsCCoPP applies to a dedicated control plane interface;Racl applies to all interfaces.DCoPP needs a AAA server,Racl does not need a AAA serverECoPP supports rate limits;Racl does not support rate limits
考题
多选题Which two statements about the use of SCREEN options are correct?()ASCREEN options are deployed at the ingress and egress sides of a packet flow.BAlthough SCREEN options are very useful, their use can result in more session creation.CSCREEN options offer protection against various attacks at the ingress zone of a packet flow.DSCREEN options examine traffic prior to policy processing, thereby resulting in fewer resouces used formalicious packet processing.
热门标签
最新试卷