网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?()
- A、DoS
- B、Smurf
- C、Man-in-the-middle
- D、Phishing
参考答案
更多 “Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?()A、DoSB、SmurfC、Man-in-the-middleD、Phishing” 相关考题
考题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS
考题
A network IPS provides which of the following?()
A. The layer 3 protocol on which other protocols like TCP and UDP communicate.B. Enables the IPSec protocol on internal workstations.C. Packet-based detection and prevention of network attacks.D. Single mode IP communication for a fiber line between remote sites.
考题
Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()
A.Update antivirus definitionsB.MAC filteringC.Effective security policiesD.User awareness training
考题
Which of the following is NOT true of security attacks?[A] Employees will keep up with security polices and awareness if they are highly-trained.[B] The rate of security attacks appears faster than the growth of the Internet.[C] One's computer system will never be secure.[D] Vulnerabilities can go through phones, wireless devices, and network appliances
考题
A customer wants to check whether they have the necessary tools enabled to prevent intrusions andvirus attacks on a Windows Vista workstation. Which of the following tools can be used to display thecurrent configuration? ()A、Security CenterB、Event Viewer Security logC、Windows DefenderD、Windows Firewall
考题
You are responsible for increasing the security within the Company LAN. Of the following choices listed below, which is true regarding layer 2 security and mitigation techniques? ()A、 Enable root guard to mitigate ARP address spoofing attacks.B、 Configure DHCP spoofing to mitigate ARP address spoofing attacks.C、 Configure PVLANs to mitigate MAC address flooding attacks.D、 Enable root guard to mitigate DHCP spoofing attacks.E、 Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted ports.F、 Configure port security to mitigate MAC address flooding G、 None of the other alternatives apply
考题
Which two statements about common network attacks are true?()A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.B、Access attacks can consist of password attacks,ping sweeps,port scans,and man-in-the-middle attacks.C、Access attacks can consist of packet sniffers,ping sweeps,port scans,and man-in-the-middle attacks.D、Reconnaissance attacks can consist of password attacks,trust exploitation,port redirection and Internet information queries.E、Reconnaissance attacks can consist of packet sniffers,port scans,ping sweeps,and Internet information queries.F、Reconnaissance attacks can consist of ping sweeps,port scans,man-in-middle attacks and Internet information queries.
考题
Which of the following IOS features can prevent IP spoofing attacks?()A、PPP over EthernetB、Cisco Express forwardingC、MPLS traffic EngineeringD、IS-IS routingE、Unicast Reverse Path Forwarding(uRPF)
考题
Birthday attacks are used against which of the following?()A、 digital signaturesB、 symmetric cipheringC、 hashalgoritmsD、 asymmetric cipheringE、 digital certificates
考题
Observe the following options carefully, which two attacks focus on RSA? ()A、BPA attackB、Adaptive chosen ciphertext attackC、DDoS attackD、Man-in-the-middle attack
考题
A network IPS provides which of the following?()A、The layer 3 protocol on which other protocols like TCP and UDP communicate.B、Enables the IPSec protocol on internal workstations.C、Packet-based detection and prevention of network attacks.D、Single mode IP communication for a fiber line between remote sites.
考题
Which of the following devices will be plugged into an AGP slot on a motherboard?()A、Video cardB、Sound carC、d Modem cardD、Network cardE、Magic I/O card
考题
If a user attempts to go to a website and notices the URL has changed, which of the following attacks is MOST likely the cause?()A、DLL injectionB、DDoS attackC、DNS poisoningD、ARP poisoning
考题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS
考题
Which of the following metrics provided by the iostat report is used to initially determine if a system is I/O bound?()A、 % idleB、 % sysC、 % userD、 % iowait
考题
Which of the following is the correct command to list the filesystems in datavg?()A、lsvg -p datavgB、lsvg -l datavgC、lsvg -L datavgD、lsvg -o datavg
考题
Which of the following commands should be used to determine which disk of a system is experiencing a disk I/O performance problem?()A、 filemonB、 istatC、 vmstatD、 iostat
考题
Which of the following commands will display a snapshot of cluster status, including details of current networkstatus and resource group fallover/fallback policies?()A、cldumpB、cllssvcsC、clshowresD、clstat -o
考题
单选题Captain Ahab is a character in which of the following works?A
Moby DickB
“O Captain, My Captain”C
The Gilded AgeD
Walden
考题
单选题Which of the following commands should be used to determine which disk of a system is experiencing a disk I/O performance problem?()A
filemonB
istatC
vmstatD
iostat
考题
单选题Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()A
Update antivirus definitionsB
MAC filteringC
Effective security policiesD
User awareness training
考题
单选题Which of the following is less vulnerable to threats and attacks because it is not associated with one specific operating system?()A
Cisco Voice and Video over VPNB
Cisco Secure Access Control ServerC
Cisco NAC ApplianceD
Cisco Threats Response
考题
单选题Client exclusion policies are used to mitigate which of the following attacks?()A
dictionaryB
bit-flip and replayC
mac spoofingD
man-in-the-middle
热门标签
最新试卷