网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?()
A
DoS
B
Smurf
C
Man-in-the-middle
D
Phishing
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?()A DoSB SmurfC Man-in-the-middleD Phishing” 相关考题
考题
Which of the following features should an administrator configure to allow an IDS to watch thetraffic on a switch?()
A. ARP spoofingB. VLANC. MirroringD. Spanning tree
考题
Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?()
A.DoSB.SmurfC.Man-in-the-middleD.Phishing
考题
A company is upgrading from DSL to a new T1. When the ISP sends a technician out, the technicianwill terminate the T1 at which of the following locations in the building?()
A. Patch panelB. FirewallC. SwitchD. Demarc
考题
What are two characteristics of dual-ring interconnect in SONET networks? ()(Choose two.)
A. It protects signals against node failures between rings.B. It protects signals against node failure within a single ring.C. It allows for traffic to be preempted when a ring switch occurs.D. Traffic can be dropped and continued at interconnecting nodes.E. It protects preemptible traffic from being dropped when a ring switch occurs.
考题
Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()A、Attacker sends multiple DHCP requests flooding DHCP serverB、Attacker connects rogue server initiating DHCP requestsC、Attacker connects rogue server replying to DHCP requestsD、Attacker sends DHCP jam signal causing DHCP server to crashE、Attacker sends gratuitous ARP replies, thereby jamming the DHCP serverF、Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server
考题
A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()A、Phishing scamB、Social engineeringC、Man-in-the-MiddleD、Shoulder surfing
考题
Which of the following is the BEST way for Karen, a technician, to mitigate phishing attempts?()A、Installing antivirusB、Reconfiguring the firewallC、Changing the permissions and passwordsD、Educating the end user
考题
Which statement is true about a Smurf attack?()A、It sends ping requests in segments of an invalid sizeB、It intercepts the third step in a TCP three-way handshake to hijack a sessionC、It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemD、It uses Trojan horse applications to create a distributed collection of "zombie" computers, which can beused to launch a coordinated DDoS attack
考题
What are two characteristics of dual-ring interconnect in SDH networks? ()A、 It protects signals against node failures between rings.B、 It protects signals against node failure within a single ring.C、 It allows for traffic to be preempted when a ring switch occurs.D、 Traffic can be dropped and continued at interconnecting nodes.E、 It protects preemptible traffic from being dropped when a ring switch occurs.
考题
Which of the following IOS features can prevent IP spoofing attacks?()A、PPP over EthernetB、Cisco Express forwardingC、MPLS traffic EngineeringD、IS-IS routingE、Unicast Reverse Path Forwarding(uRPF)
考题
Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?()A、DoSB、SmurfC、Man-in-the-middleD、Phishing
考题
A company is upgrading from DSL to a new T1. When the ISP sends a technician out, the technicianwill terminate the T1 at which of the following locations in the building?()A、Patch panelB、FirewallC、SwitchD、Demarc
考题
Which of the following features should an administrator configure to allow an IDS to watch thetraffic on a switch?()A、ARP spoofingB、VLANC、MirroringD、Spanning tree
考题
When load balancing traffic between two web servers, which of the following technologies provides the LOWEST cost solution?()A、 Active/passive clusterB、 Active/active clusterC、 Log shippingD、 DNS round robin
考题
Which statement describes exception traffic?()A、Exception traffic must be sent to the PFE for processing.B、Exception traffic enters one ingress port and is sent out multiple egress ports.C、Exception traffic is rate-limited on the internal link to prevent DoS attacks.D、Exception traffic is processed after forwarding traffic when congestion exists.
考题
多选题Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()AAttacker sends multiple DHCP requests flooding DHCP serverBAttacker connects rogue server initiating DHCP requestsCAttacker connects rogue server replying to DHCP requestsDAttacker sends DHCP jam signal causing DHCP server to crashEAttacker sends gratuitous ARP replies, thereby jamming the DHCP serverFAttacker sends unsolicited DHCP replies, thereby jamming the DHCP server
考题
单选题What occurs on a Frame Relay network when the CIR is exceeded?()A
All TCP traffic is marked discard eligibleB
All UDP traffic is marked discard eligible and a BECN is sentC
All TCP traffic is marked discard eligible and a BECN is sentD
All traffic exceeding the CIR is marked discard eligible
考题
单选题How does the PFE handle unicast transit traffic destined for an existing forwarding table entry?()A
It sends the traffic through one egress port toward its destinationB
It sends the traffic through multiple egress ports to all available receiversC
It sends the traffic through an internal link to the RED
It sends the traffic to the local system for further processing
考题
单选题You have just configured a static default route on router TK1. What is the purpose of a default route?()A
It is a route to be used when the routing protocol fails.B
It is a route configured by an ISP that sends traffic into a corporate network.C
It is a route used when a packet is destined for a remote network that is not listed in the routing table.D
It is a route manually configured for a specific remote network for which a routing protocol is not configured.E
It is used to send traffic to a stub network.
考题
单选题Which statement describes exception traffic?()A
Exception traffic must be sent to the PFE for processing.B
Exception traffic enters one ingress port and is sent out multiple egress ports.C
Exception traffic is rate-limited on the internal link to prevent DoS attacks.D
Exception traffic is processed after forwarding traffic when congestion exists.
考题
单选题Which of the following features should an administrator configure to allow an IDS to watch thetraffic on a switch?()A
ARP spoofingB
VLANC
MirroringD
Spanning tree
考题
单选题A company is upgrading from DSL to a new T1. When the ISP sends a technician out, the technicianwill terminate the T1 at which of the following locations in the building?()A
Patch panelB
FirewallC
SwitchD
Demarc
考题
单选题When load balancing traffic between two web servers, which of the following technologies provides the LOWEST cost solution?()A
Active/passive clusterB
Active/active clusterC
Log shippingD
DNS round robin
考题
单选题Which statement is true about a Smurf attack?()A
It sends ping requests in segments of an invalid sizeB
It intercepts the third step in a TCP three-way handshake to hijack a sessionC
It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemD
It uses Trojan horse applications to create a distributed collection of zombie computers, which can beused to launch a coordinated DDoS attack
考题
单选题Which of the following IOS features can prevent IP spoofing attacks?()A
PPP over EthernetB
Cisco Express forwardingC
MPLS traffic EngineeringD
IS-IS routingE
Unicast Reverse Path Forwarding(uRPF)
考题
单选题Which of the following is the BEST way for Karen, a technician, to mitigate phishing attempts?()A
Installing antivirusB
Reconfiguring the firewallC
Changing the permissions and passwordsD
Educating the end user
考题
单选题Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()A
Network layer firewallB
Stateful inspection firewallC
Zone aware firewallD
Application layer firewall
热门标签
最新试卷