网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?()
A
Phishing
B
Smurf attack
C
Denial of service
D
Man-in-the-middle
参考答案
参考解析
解析:
暂无解析
更多 “单选题A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?()A PhishingB Smurf attackC Denial of serviceD Man-in-the-middle” 相关考题
考题
单选题Office A is located 500 miles (805 kilometers) away from Office B, yet they are on the same private network. Which of the following is MOST likely being used to accomplish this scenario?()A
TrunkingB
LANC
VPND
Peer to peer
考题
单选题After testing a new 100BaseTX cable, the technician determines that only pairs 4, 5, 7, and 8 are straight-thru wires. Which of the following MOST likely describes this cable type?()A
Crossover cable with open pairsB
Crossover cableC
Rollover cableD
Straight-thru cable with open pairs
考题
单选题Which of the following is the MOST likely authentication scheme used in 802.1x?()A
CHAPB
RADIUSC
TACACS+D
Kerberos
考题
单选题Which of the following protocols is used to encrypt data between web servers and web browsers?()A
SMTPB
SIPC
HTTPD
SSL
考题
单选题A technician is reporting wireless transmission speeds of 300Mbps. Which of the following wireless standards is being used?()A
802.11aB
802.11bC
802.11gD
802.11n
考题
单选题Which of the following analyzes the entire subnet to identify all hosts that are active?()A
Ping sweepB
Packet snifferC
TracerouteD
Port scanner
考题
单选题Which of the following is required if ports from VLANs on two separate switches need to broadcastto each other?()A
Port mirroringB
VPNC
TrunkingD
Port authentication
热门标签
最新试卷