网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which two network attack statements are true?()

  • A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.
  • B、Access attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.
  • C、DoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.
  • D、DoS attacks can consist of IP spoofing and DDoS attacks.
  • E、IP spoofing can be reduced through the use of policy-based routing.
  • F、IP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.

参考答案

更多 “Which two network attack statements are true?()A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.B、Access attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.C、DoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.D、DoS attacks can consist of IP spoofing and DDoS attacks.E、IP spoofing can be reduced through the use of policy-based routing.F、IP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.” 相关考题
考题 Which two patented or patent-pending compression and caching technologies are used for WX/WXC devices?()(Choose two.) A. Network Sequence Caching (NSC)B. Molecular Sequence Caching (MSC)C. Network Sequence Reduction (NSR)D. Molecular Sequence Reduction (MSR)

考题 Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.Which two actions should you perform?() A.AB.BC.CD.DE.E

考题 You are an experienced network administrator in an international corporation. One of your clients asks you to configure a network for a financial trading center which requires multiple high-value transactions.And the transactions are very important to the client. In such a situation, which two of the following are basic and most important requirements concerning the configuration? ()(Choose two.)A. no single point of failureB. determine which protocol to useC. trading database server locationD. deterministic response to all failures

考题 Which two benefits does VoFR provide?() A. bandwidth efficiencyB. cell-switchingC. congestion notificationD. heterogeneous network

考题 Which of the following statements describe the network shown in the graphic?() A. There are two broadcast domains in the network.B. There are four broadcast domains in the network.C. There are six broadcast domains in the network.D. There are four collision domains in the network.E. There are five collision domains in the network.F. There are seven collision domains in the network.

考题 Which two devices can interfere with the operation of a wireless network because they operate on similar frequencies? (Choose two.)()A、copierB、microwave ovenC、toasterD、cordless phoneE、IP phoneF、AM radio

考题 Which two of the following options are categories of Network Maintenance tasks?()A、FirefightingB、Interrupt-drivenC、Policy-basedD、StructuredE、Foundational

考题 You are an experienced network administrator in an international corporation. One of your clients asks you to configure a network for a financial trading center which requires multiple high-value transactions. And the transactions are very important to the client. In such a situation, which two of the following are basic and most important requirements concerning the configuration? ()(Choose two.)A、no single point of failureB、determine which protocol to useC、trading database server locationD、deterministic response to all failures

考题 Which two OSPF LSA types are new in OSPF version 3? ()A、LinkB、NSSA externalC、Network linkD、Intra-area prefixE、AS domain

考题 Layer 3 (the network layer) provides connectivity and path selection between two host systems that may be located on geographically separated networks. Which two devices operate at the network layer?()A、 applicationB、 hubC、 switchD、 bridgeE、 router

考题 Which two are characteristics of the IS -IS protocol but not OSPF?()A、forms adjacencies with all neighborsB、supports demand circuit routingC、provides routing support for multiple network layer protocolsD、utilizes SPF algorithmE、provides for network scalability by allowing the network to be separated into areasF、three layers of hierarchical routing

考题 In which two locations in an enterprise network can an IPS sensor be placed? ()A、 bridging VLANs on two switchesB、 bridging two VLANs on one switchC、 between two Layer 2 devices with trunkingD、 between two Layer 2 devices without trunkingE、 between a Layer 2 device and a Layer 3 device with trunking

考题 Network management saves time and money by automating which two tasks? ()A、Configuring changes to hardware and softwareB、Monitoring online purchasingC、Monitoring user access to storage filesD、Monitoring and troubleshooting network devices

考题 Which two are needed components when designing and implementing a security solution?()A、detailed VLAN informationB、an incident response planC、results of testing the new network configurationD、an existing hierarchical network topologyE、a security policy for your organization

考题 Which of the following network topologies BEST describes a VPN? ()(Select TWO)A、Point to PointB、Point to MultipointC、VLAND、RingE、Bus

考题 Which two patented or patent-pending compression and caching technologies are used for WX/WXC devices?()(Choose two.)A、Network Sequence Caching (NSC)B、Molecular Sequence Caching (MSC)C、Network Sequence Reduction (NSR)D、Molecular Sequence Reduction (MSR)

考题 多选题When HSRP is configured on a network, which two of these items are provided, which are shared between the routers that run HSRP ?() (choose two)AShared single interfaceBIP AddressCTCP-based hello packetsDMAC address

考题 单选题Layer 3 (the network layer) provides connectivity and path selection between two host systems that may be located on geographically separated networks. Which two devices operate at the network layer?()A  applicationB  hubC  switchD  bridgeE  router

考题 多选题Which two are uses of NAT?()Aenabling network migrationsBconserving public IP addressesCallowing stateful packet inspectionDpreventing unauthorized connections from outside the network

考题 多选题Which two benefits does VoFR provide? ()Abandwidth efficiencyBcell-switchingCcongestion notificationDheterogeneous network

考题 多选题Which two are characteristics of the IS -IS protocol but not OSPF?()Aforms adjacencies with all neighborsBsupports demand circuit routingCprovides routing support for multiple network layer protocolsDutilizes SPF algorithmEprovides for network scalability by allowing the network to be separated into areasFthree layers of hierarchical routing

考题 多选题In which two locations in an enterprise network can an IPS sensor be placed?()Abridging VLANs on two switchesBbridging two VLANs on one switchCbetween two Layer 2 devices withtrunkingDbetween two Layer 2 devices withouttrunkingEbetween a Layer 2 device and a Layer 3 device withtrunking

考题 多选题In which two locations in an enterprise network can an IPS sensor be placed?()Abridging VLANs on two switchesBbridging two VLANs on one switchCbetween two Layer 2 devices with trunkingDbetween two Layer 2 devices without trunkingEbetween a Layer 2 device and a Layer 3 device with trunking

考题 多选题Which two devices can interfere with the operation of a wireless network because they operate on similar frequencies? (Choose two.)()AcopierBmicrowave ovenCtoasterDcordless phoneEIP phoneFAM radio