网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?()
A

DoS

B

Smurf

C

Man-in-the-middle

D

Phishing


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?()A DoSB SmurfC Man-in-the-middleD Phishing” 相关考题
考题 Which of the following features should an administrator configure to allow an IDS to watch thetraffic on a switch?() A. ARP spoofingB. VLANC. MirroringD. Spanning tree

考题 Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?() A.DoSB.SmurfC.Man-in-the-middleD.Phishing

考题 A company is upgrading from DSL to a new T1. When the ISP sends a technician out, the technicianwill terminate the T1 at which of the following locations in the building?() A. Patch panelB. FirewallC. SwitchD. Demarc

考题 What are two characteristics of dual-ring interconnect in SONET networks? ()(Choose two.) A. It protects signals against node failures between rings.B. It protects signals against node failure within a single ring.C. It allows for traffic to be preempted when a ring switch occurs.D. Traffic can be dropped and continued at interconnecting nodes.E. It protects preemptible traffic from being dropped when a ring switch occurs.

考题 Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()A、Attacker sends multiple DHCP requests flooding DHCP serverB、Attacker connects rogue server initiating DHCP requestsC、Attacker connects rogue server replying to DHCP requestsD、Attacker sends DHCP jam signal causing DHCP server to crashE、Attacker sends gratuitous ARP replies, thereby jamming the DHCP serverF、Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server

考题 A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()A、Phishing scamB、Social engineeringC、Man-in-the-MiddleD、Shoulder surfing

考题 Which of the following is the BEST way for Karen, a technician, to mitigate phishing attempts?()A、Installing antivirusB、Reconfiguring the firewallC、Changing the permissions and passwordsD、Educating the end user

考题 Which statement is true about a Smurf attack?()A、It sends ping requests in segments of an invalid sizeB、It intercepts the third step in a TCP three-way handshake to hijack a sessionC、It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemD、It uses Trojan horse applications to create a distributed collection of "zombie" computers, which can beused to launch a coordinated DDoS attack

考题 What are two characteristics of dual-ring interconnect in SDH networks? ()A、 It protects signals against node failures between rings.B、 It protects signals against node failure within a single ring.C、 It allows for traffic to be preempted when a ring switch occurs.D、 Traffic can be dropped and continued at interconnecting nodes.E、 It protects preemptible traffic from being dropped when a ring switch occurs.

考题 Which of the following IOS features can prevent IP spoofing attacks?()A、PPP over EthernetB、Cisco Express forwardingC、MPLS traffic EngineeringD、IS-IS routingE、Unicast Reverse Path Forwarding(uRPF)

考题 Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?()A、DoSB、SmurfC、Man-in-the-middleD、Phishing

考题 A company is upgrading from DSL to a new T1. When the ISP sends a technician out, the technicianwill terminate the T1 at which of the following locations in the building?()A、Patch panelB、FirewallC、SwitchD、Demarc

考题 Which of the following features should an administrator configure to allow an IDS to watch thetraffic on a switch?()A、ARP spoofingB、VLANC、MirroringD、Spanning tree

考题 When load balancing traffic between two web servers, which of the following technologies provides the LOWEST cost solution?()A、 Active/passive clusterB、 Active/active clusterC、 Log shippingD、 DNS round robin

考题 Which statement describes exception traffic?()A、Exception traffic must be sent to the PFE for processing.B、Exception traffic enters one ingress port and is sent out multiple egress ports.C、Exception traffic is rate-limited on the internal link to prevent DoS attacks.D、Exception traffic is processed after forwarding traffic when congestion exists.

考题 多选题Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()AAttacker sends multiple DHCP requests flooding DHCP serverBAttacker connects rogue server initiating DHCP requestsCAttacker connects rogue server replying to DHCP requestsDAttacker sends DHCP jam signal causing DHCP server to crashEAttacker sends gratuitous ARP replies, thereby jamming the DHCP serverFAttacker sends unsolicited DHCP replies, thereby jamming the DHCP server

考题 单选题What occurs on a Frame Relay network when the CIR is exceeded?()A All TCP traffic is marked discard eligibleB All UDP traffic is marked discard eligible and a BECN is sentC All TCP traffic is marked discard eligible and a BECN is sentD All traffic exceeding the CIR is marked discard eligible

考题 单选题How does the PFE handle unicast transit traffic destined for an existing forwarding table entry?()A It sends the traffic through one egress port toward its destinationB It sends the traffic through multiple egress ports to all available receiversC It sends the traffic through an internal link to the RED It sends the traffic to the local system for further processing

考题 单选题You have just configured a static default route on router TK1. What is the purpose of a default route?()A It is a route to be used when the routing protocol fails.B It is a route configured by an ISP that sends traffic into a corporate network.C It is a route used when a packet is destined for a remote network that is not listed in the routing table.D It is a route manually configured for a specific remote network for which a routing protocol is not configured.E It is used to send traffic to a stub network.

考题 单选题Which statement describes exception traffic?()A Exception traffic must be sent to the PFE for processing.B Exception traffic enters one ingress port and is sent out multiple egress ports.C Exception traffic is rate-limited on the internal link to prevent DoS attacks.D Exception traffic is processed after forwarding traffic when congestion exists.

考题 单选题Which of the following features should an administrator configure to allow an IDS to watch thetraffic on a switch?()A ARP spoofingB VLANC MirroringD Spanning tree

考题 单选题A company is upgrading from DSL to a new T1. When the ISP sends a technician out, the technicianwill terminate the T1 at which of the following locations in the building?()A Patch panelB FirewallC SwitchD Demarc

考题 单选题When load balancing traffic between two web servers, which of the following technologies provides the LOWEST cost solution?()A  Active/passive clusterB  Active/active clusterC  Log shippingD  DNS round robin

考题 单选题Which statement is true about a Smurf attack?()A It sends ping requests in segments of an invalid sizeB It intercepts the third step in a TCP three-way handshake to hijack a sessionC It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemD It uses Trojan horse applications to create a distributed collection of zombie computers, which can beused to launch a coordinated DDoS attack

考题 单选题Which of the following IOS features can prevent IP spoofing attacks?()A PPP over EthernetB Cisco Express forwardingC MPLS traffic EngineeringD IS-IS routingE Unicast Reverse Path Forwarding(uRPF)

考题 单选题Which of the following is the BEST way for Karen, a technician, to mitigate phishing attempts?()A Installing antivirusB Reconfiguring the firewallC Changing the permissions and passwordsD Educating the end user

考题 单选题Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()A Network layer firewallB Stateful inspection firewallC Zone aware firewallD Application layer firewall