网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following descriptions about IP spoofing is correct?()
A
IP source address is forged
B
IP destination address is forged
C
IP TCP source port is forged
D
IP TCP destination port is forged
E
None of above
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following descriptions about IP spoofing is correct?()A IP source address is forgedB IP destination address is forgedC IP TCP source port is forgedD IP TCP destination port is forgedE None of above” 相关考题
考题
About the following IP addresses , Which is incorrect ?A.201.199.255.11B.201.198.132.1C.201.199.128.6D.201.198.134.257
考题
Which of the following statements about internet is (are) correct?Ⅰ.Each host in internet only has a IP address.Ⅱ.It is possible to have multiple names corresponding to the same IP address.Ⅲ.In users' points, Internet means a virtual network.A.NoneB.Ⅰ and ⅡC.Ⅱ and ⅢD.All
考题
Which descriptions below are true about Stephen Hawking?()
A.theoretical physicistB.British mathematicianC.born in OxfordD.author of best seller
考题
Which of the following is true about an IP address if the first bit is a zero?()
A. The address is a Class A address.B. The address is a Class B address.C. The address is a Class C address.D. The address is a Class D address.
考题
Which of the following is the most effective technique to prevent source IPAddress spoofing?()A、 policy based routing (PBR)B、 unicast reverse path forwarding (uRPF)C、 lock and keyACLD、 RFC 1918filteringE、 IP source routing
考题
Which of the following descriptions about IP spoofing is correct?()A、IP source address is forgedB、IP destination address is forgedC、IP TCP source port is forgedD、IP TCP destination port is forgedE、None of above
考题
The Company security administrator wants to prevent DHCP spoofing. Which statement is true about DHCP spoofing operation?()A、 DHCP spoofing and SPAN cannot be used on the same port of a switch.B、 To prevent a DHCP spoofing, the DHCP server must create a static ARP entry that cannot be updated by a dynamic ARP packet.C、 To prevent a DHCP spoofing, the switch must have DHCP server services disabled and a static entry pointing towards the DHCP server.D、 DHCP spoofing can be prevented by placing all unused ports in an unused VLAN.E、 None of the other alternatives apply.
考题
Which of the following commands can be used to gather information about the AS-PATH of a BGProute? (Choose all that apply.)()A、show ip bgp neighborsB、debug ip bgp updatesC、show ip route bgpD、show ip bgpE、show ip bgp summaryF、sh ip bgp database
考题
As an experienced technician, you are responsible for Technical Support. Which of the following descriptions is correct about the characteristic of SLB one arm mode?()A、This out-of-band approach supports scalingB、SLB is not inline.C、Mode is not as common as bridge or routed mode.D、Return traffic requires PBR, server default gateway pointing to SLB, or client source NAT.
考题
The Company is concerned about Layer 2 security threats. Which statement is true about these threats? ()A、 MAC spoofing attacks allow an attacking device to receive frames intended for a different network host.B、 Port scanners are the most effective defense against dynamic ARP inspection.C、 MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable attack points.D、 Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP snooping attacks.E、 DHCP snooping sends unauthorized replies to DHCP queries.F、 ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.G、 None of the other alternatives apply.
考题
An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A、Secure VPNB、MAC filteringC、IP filteringD、Static IP addresses
考题
You are responsible for increasing the security within the Company LAN. Of the following choices listed below, which is true regarding layer 2 security and mitigation techniques? ()A、 Enable root guard to mitigate ARP address spoofing attacks.B、 Configure DHCP spoofing to mitigate ARP address spoofing attacks.C、 Configure PVLANs to mitigate MAC address flooding attacks.D、 Enable root guard to mitigate DHCP spoofing attacks.E、 Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted ports.F、 Configure port security to mitigate MAC address flooding G、 None of the other alternatives apply
考题
Which of the following IOS features can prevent IP spoofing attacks?()A、PPP over EthernetB、Cisco Express forwardingC、MPLS traffic EngineeringD、IS-IS routingE、Unicast Reverse Path Forwarding(uRPF)
考题
As a Cisco Network Engineer, you have to master the knowledge of the Cisco validated Design (CVD) program. Which three of the following descriptions are appropriate about the CVD program?() (Choose three.)A、It incorporates a narrow range of technologies and products.B、It facilitates faster and more reliable customer deployments.C、It extends the value of designs through a sustained development plan.D、It incorporates products and technologies into enterprise, service provider, and commercial systems.
考题
Which of the following processes translates a private IP address for a public IP address?()A、NATB、DNSC、DHCPD、PAT
考题
Which of the following is true about an IP address if the first bit is a zero?()A、The address is a Class A address.B、The address is a Class B address.C、The address is a Class C address.D、The address is a Class D address.
考题
Which of the following statements is true about IPAT via IP replacement?() A、 Configuration of Hardware Address Takeover is supported.B、 Fewer physical network interface cards are required in the cluster.C、 It is the default for keeping a service IP labels highly available.D、 None-service ip labels must use different subnets than service IP labels.
考题
Which of the following cmdlets will you use to check all aspects of the replication and replay status to provide a cor Mailbox server in a database availability group (DAG)?()A、Get-DatabaseAvailabilityGroupB、Test-MRSHealthC、Test-ReplicationHealthD、Get-DetailsTemplate
考题
单选题Which of the following statements is true about IPAT via IP replacement?()A
Configuration of Hardware Address Takeover is supported.B
Fewer physical network interface cards are required in the cluster.C
It is the default for keeping a service IP labels highly available.D
None-service ip labels must use different subnets than service IP labels.
考题
单选题An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A
Secure VPNB
MAC filteringC
IP filteringD
Static IP addresses
考题
单选题With respect to centrifugal pump impellers, which of the following descriptions represents the correct centrifugal pump classification? ()A
Single stage or multistageB
High pressure or low pressureC
Open or close coupledD
Horizontal or vertical
考题
单选题Which of the following is the most effective technique to prevent source IPAddress spoofing?()A
policy based routing (PBR)B
unicast reverse path forwarding (uRPF)C
lock and keyACLD
RFC 1918filteringE
IP source routing
考题
多选题Which of the following commands can be used to gather information about the AS-PATH of a BGProute? (Choose all that apply.)()Ashow ip bgp neighborsBdebug ip bgp updatesCshow ip route bgpDshow ip bgpEshow ip bgp summaryFsh ip bgp database
考题
单选题Which of the following descriptions about IP spoofing is correct?()A
IP source address is forgedB
IP destination address is forgedC
IP TCP source port is forgedD
IP TCP destination port is forgedE
None of above
考题
单选题Which of the following cmdlets will you use to check all aspects of the replication and replay status to provide a cor Mailbox server in a database availability group (DAG)?()A
Get-DatabaseAvailabilityGroupB
Test-MRSHealthC
Test-ReplicationHealthD
Get-DetailsTemplate
考题
单选题The Company security administrator wants to prevent DHCP spoofing. Which statement is true about DHCP spoofing operation?()A
DHCP spoofing and SPAN cannot be used on the same port of a switch.B
To prevent a DHCP spoofing, the DHCP server must create a static ARP entry that cannot be updated by a dynamic ARP packet.C
To prevent a DHCP spoofing, the switch must have DHCP server services disabled and a static entry pointing towards the DHCP server.D
DHCP spoofing can be prevented by placing all unused ports in an unused VLAN.E
None of the other alternatives apply.
考题
多选题Which three of the following descriptions are true about the firewall modes? ()ATransparent mode is layer 2.BRouted mode is layer 3.CRouted mode has 1 IP address.DTransparent mode has 1 IP address.
考题
单选题As an experienced technician, you are responsible for Technical Support. Which of the following descriptions is correct about the characteristic of SLB one arm mode?()A
This out-of-band approach supports scalingB
SLB is not inline.C
Mode is not as common as bridge or routed mode.D
Return traffic requires PBR, server default gateway pointing to SLB, or client source NAT.
热门标签
最新试卷