网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()
A

Worm

B

Smurf

C

Logic Bomb

D

Man-in-the-middle


参考答案

参考解析
解析: 暂无解析
更多 “单选题A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A WormB SmurfC Logic BombD Man-in-the-middle” 相关考题
考题 Which CLI command ensures that RADIUS packets are being sent to and received from the RADIUS server?() A. show radiusB. show aaa domain-mapC. show aaa statisticsD. show radius authentication server

考题 A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A.WormB.SmurfC.Logic BombD.Man-in-the-middle

考题 Split horizon has been enabled within the Ezonexam routed network. Which one of the following statements best explains the split horizon rule?A.Only routers can split boundaries (horizons) between networks in separate AS numbers.B.Each AS must keep routing tables converged to prevent dead routes from being advertised across boundaries.C.Once a route is received on an interface, advertise that route as unreachable back out the same interface.D.Information about a route should never be sent back in the direction from which the original update came.E.None of the above

考题 A network at a small business utilizes a star topology and is experiencing frequent collisionsamong data packets. Which of the following devices is MOST likely being used?() A. Unmanaged switchB. Hardware firewallC. HubD. Managed switch

考题 An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?() A.netstatB.tracerouteC.nbtstatD.ping

考题 What is the purpose of this command? ip route 0.0.0.0 0.0.0.0 serial0/0() A. It configures a router to send all packets out interface serial 0/0.B. It configures a router to block routing updates from being sent out interface serial 0/0.C. It configures a router as a firewall, blocking all unauthorized packets from exiting serial 0/0.D. It configures a router to send all packets for unknown destination networks out interface serial 0/0.E. It configures a router to drop all packets for which the destination network is unknown.

考题 Refer to the exhibit. Routing updates for the 192.168.1.0 network are being received from all three neighbors. Which statement is correct regarding the result of the con figuration shown? () A. The router will prefer the next hop of 172.16.1.1 for packets destined for the 192.168.1.0 network.B. The router will prefer the next hop of 172.26.1.1 for packets destined for the 192.168.1.0 network.C. The router will adve rtise the 192.168.1.0 network only to 172.30.1.1.D. The router will advertise the 192.168.1.0 network only to 172.26.1.1.E. The router will prefer the next hop of 172.26.1.1 for packets except those destined for the 192.168.1.0 network.

考题 In a point-to point network, which address are OSPF hello packets sent to?() A.127.0.0.1B.192.168.0.5C.223.0.0.1D.172.16.0.1E.224.0.0.5F.254.255.255.255.255

考题 IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.A.pubic] B.private] C.personal D.proper

考题 In a point-to point network, which address are OSPF hello packets sent to?()A、127.0.0.1B、192.168.0.5C、223.0.0.1D、172.16.0.1E、224.0.0.5F、254.255.255.255.255

考题 VOIP is being implemented in the Company network and you need to assess the need for QoS.   Which of the following network problems would indicate a need to implement QoS features?()A、Mis-routed packets  B、Excess jitterC、Delay of critical trafficD、Packet loss due to congestionE、Data link layer broadcast stormsF、FTP connections unsuccessful

考题 VOIP has been implemented at the main office of the Company network. Which two statements  are true about voice packets in a LAN?()A、 Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media  portion of the VoIP communication.  B、 Voice traffic data flow involves large volumes of large packets.  C、 Because a packet loss involves a small amount of data, voice traffic is less affected by packet  losses than traditional data traffic is.  D、 Voice packets are encapsulated in TCP segments to allow for proper sequencing during  delivery. E、 Voice packets are very sensitive to delay and jitter. 

考题 Which CLI command ensures that RADIUS packets are being sent to and received from the RADIUS server?()A、show radiusB、show aaa domain-mapC、show aaa statisticsD、show radius authentication server

考题 Which two statements about MPLS Label Distribution Protocol (LDP) are true? ()A、LDP hello packets are sent to TCP 646.B、LDP session packets are sent to TCP 646.C、LDP session packets are sent to TCP 711.D、LDP hello packets are sent to TCP 711.E、LDP hello packets are sent to UDP 711.F、LDP hello packets are sent to UDP 646.

考题 An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?()A、netstatB、tracerouteC、nbtstatD、ping

考题 A network at a small business utilizes a star topology and is experiencing frequent collisionsamong data packets. Which of the following devices is MOST likely being used?()A、Unmanaged switchB、Hardware firewallC、HubD、Managed switch

考题 A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A、WormB、SmurfC、Logic BombD、Man-in-the-middle

考题 A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?()A、IGPB、EIGRPC、EGPD、BGP

考题 单选题Which CLI command ensures that RADIUS packets are being sent to and received from the RADIUS server?()A show radiusB show aaa domain-mapC show aaa statisticsD show radius authentication server

考题 单选题A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?()A IGPB EIGRPC EGPD BGP

考题 单选题A network at a small business utilizes a star topology and is experiencing frequent collisionsamong data packets. Which of the following devices is MOST likely being used?()A Unmanaged switchB Hardware firewallC HubD Managed switch

考题 多选题VOIP has been implemented at the main office of the Company network. Which two statements  are true about voice packets in a LAN?()AVoice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media  portion of the VoIP communication.BVoice traffic data flow involves large volumes of large packets.CBecause a packet loss involves a small amount of data, voice traffic is less affected by packet  losses than traditional data traffic is.DVoice packets are encapsulated in TCP segments to allow for proper sequencing during  delivery.EVoice packets are very sensitive to delay and jitter.

考题 单选题What is the purpose of this command? ip route 0.0.0.0 0.0.0.0 serial0/0()A It configures a router to send all packets out interface serial 0/0.B It configures a router to block routing updates from being sent out interface serial 0/0.C It configures a router as a firewall, blocking all unauthorized packets from exiting serial 0/0.D It configures a router to send all packets for unknown destination networks out interface serial 0/0.E It configures a router to drop all packets for which the destination network is unknown.

考题 多选题Which three best describe the customer benefits of the Cisco Lifecycle Services approach?()Aimprove the skill sets of its staff membersBincrease the value of and return on investment for its networksCincrease network staff productivityDincrease the amount of server room rack spaceEimprove network availability, resiliency, security, and scalabilityFincrease the amount of time required to integrate network changes

考题 单选题In a point-to point network, which address are OSPF hello packets sent to?()A 127.0.0.1B 192.168.0.5C 223.0.0.1D 172.16.0.1E 224.0.0.5F 254.255.255.255.255

考题 多选题Which two statements about MPLS Label Distribution Protocol (LDP) are true? ()ALDP hello packets are sent to TCP 646.BLDP session packets are sent to TCP 646.CLDP session packets are sent to TCP 711.DLDP hello packets are sent to TCP 711.ELDP hello packets are sent to UDP 711.FLDP hello packets are sent to UDP 646.

考题 单选题An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?()A netstatB tracerouteC nbtstatD ping