网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
SYN风暴属于()。
- A、拒绝服务攻击
- B、缓冲区溢出攻击
- C、操作系统漏洞攻击
- D、IP欺骗攻击
参考答案
更多 “SYN风暴属于()。A、拒绝服务攻击B、缓冲区溢出攻击C、操作系统漏洞攻击D、IP欺骗攻击” 相关考题
考题
在C/S环境中,以下哪个是建立一个完整TCP连接的正确顺序()。A.SYN,SYN/ACK,ACKB.PassiveOpen,ActiveOpen,ACK,ACKC.SYN,ACK/SYN,ACKD.ActiveOpen/PassiveOpen,ACK,ACK
考题
Which parameters are valid SCREEN options for combating operating system probes?()
A. syn-fin, syn-flood, and tcp-no-fragB. syn-fin, port-scan, and tcp-no-flagC. syn-fin, fin-no-ack, and tcp-no-fragD. syn-fin, syn-ack-ack-proxy, and tcp-no-frag
考题
Which parameters must you select when configuring operating system probes SCREEN options?()
A. syn-fin, syn-flood, and tcp-no-fragB. syn-fin, port-scan, and tcp-no-flagC. syn-fin, fin-no-ack, and tcp-no-fragD. syn-fin, syn-ack-ack-proxy, and tcp-no-frag
考题
TCP端口全扫描方式,扫描、被扫描端口(开放)间的会话过程()。
A.SYN-SYN+ACK-ACK-ACK+FINB.SYN-SYN+ACK-RSTC.SYN-ACK+RSTD.SYN-SYN+ACK-ACK+FIN
考题
TCP会话通过3次握手来建立连接。其中第一次握手:源主机发送一个同步标志位SYN=1的TCP数据段。源主机进入SYN-SENT状态。第二次握手:目标主机接收到SYN包后发回确认数据报文。该数据报文ACK=1。此时目标主机进入(SYN-RCVD)状态,源主机进入( )状态。A.SYN-SENT
B.SYN-RCVD
C.ESTABLISHED
D.CLOSE-WAIT
考题
TCP/IP的通信过程是?()A、——SYN/ACK——,——ACK,——SYN/ACK——B、——SYN/ACK——,——SYN/ACK——,——ACK——C、——SYN——,——ACK,——SYN——,——ACK——D、——SYN——,——SYN/ACK——,——ACK——
考题
What is true about SYN cookies?()A、 All TCPoptions are supported, such as largewindows.B、 The server can have more than8 unique MSS values.C、 SYN cookies are not implemented as a method of defending against SYN floods.D、 SYN cookies are implemented as a method of defending against SYN floods.
考题
Which parameters are valid SCREEN options for combating operating system probes?()A、syn-fin, syn-flood, and tcp-no-fragB、syn-fin, port-scan, and tcp-no-flagC、syn-fin, fin-no-ack, and tcp-no-fragD、syn-fin, syn-ack-ack-proxy, and tcp-no-frag
考题
在C/S环境中,以下哪个是建立一个完整TCP连接的正确顺序?()A、SYN,SYN/ACK,ACKB、PassiveOpen,ActiveOpen,ACK,ACKC、SYN,ACK/SYN,ACKD、ActiveOpen/PassiveOpen,ACK,ACK
考题
以下关于SecPath防火墙syn-Flood攻击防御技术,描述正确的是()。A、基于TCP半开连接数限制方法防范SYN Flood攻击B、基于TCP新建连接速率限制方法防范SYN Flood攻击C、利用SYN Cookie技术防范SYN Flood攻击D、通过利用Safe Reset技术防范SYN Flood攻击
考题
TCP端口全扫描方式,扫描、被扫描端口(开放)间的会话过程()。A、SYN-SYN+ACK-ACK-ACK+FINB、SYN-SYN+ACK-RSTC、SYN-ACK+RSTD、SYN-SYN+ACK-ACK+FIN
考题
单选题What is true about SYN cookies?()A
All TCPoptions are supported, such as largewindows.B
The server can have more than8 unique MSS values.C
SYN cookies are not implemented as a method of defending against SYN floods.D
SYN cookies are implemented as a method of defending against SYN floods.
考题
单选题TCP端口全扫描方式,扫描、被扫描端口(开放)间的会话过程()。A
SYN-SYN+ACK-ACK-ACK+FINB
SYN-SYN+ACK-RSTC
SYN-ACK+RSTD
SYN-SYN+ACK-ACK+FIN
热门标签
最新试卷