网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following would an attacker use to footprint a system?()
A
RADIUS
B
Password cracker
C
Port scanner
D
Man-in-the-middle attack
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following would an attacker use to footprint a system?()A RADIUSB Password crackerC Port scannerD Man-in-the-middle attack” 相关考题
考题
Which of the following utilities would a technician use to prevent a service from starting duringsystem startup?()
A. Event ViewerB. System File CheckerC. MSCONFIGD. Task Manager
考题
A user has forgotten their BIOS password on their computer. Which of the following would atechnician use to allow the user access to their PC?()
A. Remove the BIOS chip on the PCB. Re-flash the BIOSC. Run password cracking software on the users PCD. Set the password clear jumper on the motherboard
考题
A technician needs to manage a switch by using the management port on the back of the switch.Which of the following cables would the technician use?()
A.StraightB.ConsoleC.CrossoverD.Loopback
考题
Which of the following monitors a server to see which protocols might be in use?()
A. Ping sweepB. Intrusion detection softwareC. Port scannerD. Wireless packet sniffer
考题
A technician needs to manage a switch by using the management port on the back of the switch.Which of the following cables would the technician use?()A、StraightB、ConsoleC、CrossoverD、Loopback
考题
Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()A、Network layer firewallB、Stateful inspection firewallC、Zone aware firewallD、Application layer firewall
考题
Which of the following commands would a system administrator use to automate monitoring and notification of filling filesystems ()A、startcondrespB、filemonC、lsfsD、mount
考题
Which of the following monitors a server to see which protocols might be in use?()A、Ping sweepB、Intrusion detection softwareC、Port scannerD、Wireless packet sniffer
考题
Which two statements about common network attacks are true?()A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.B、Access attacks can consist of password attacks,ping sweeps,port scans,and man-in-the-middle attacks.C、Access attacks can consist of packet sniffers,ping sweeps,port scans,and man-in-the-middle attacks.D、Reconnaissance attacks can consist of password attacks,trust exploitation,port redirection and Internet information queries.E、Reconnaissance attacks can consist of packet sniffers,port scans,ping sweeps,and Internet information queries.F、Reconnaissance attacks can consist of ping sweeps,port scans,man-in-middle attacks and Internet information queries.
考题
Observe the following options carefully, which two attacks focus on RSA? ()A、BPA attackB、Adaptive chosen ciphertext attackC、DDoS attackD、Man-in-the-middle attack
考题
Which of the following would an attacker use to footprint a system?()A、RADIUSB、Password crackerC、Port scannerD、Man-in-the-middle attack
考题
Which of the following locations would a technician use to add a Windows 7 computer to adomain?()A、System PropertiesB、Windows DefenderC、Network and Sharing CenterD、Device Manager
考题
A user has forgotten their BIOS password on their computer. Which of the following would atechnician use to allow the user access to their PC?()A、Remove the BIOS chip on the PCB、Re-flash the BIOSC、Run password cracking software on the users PCD、Set the password clear jumper on the motherboard
考题
Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()A、Protocol analyzerB、Vulnerability scannerC、Port scannerD、Penetration test
考题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS
考题
A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()A、User ID/password fileB、Communications layerC、Client applicationsD、Operating system
考题
Which of the following commands would a system administrator use to initiate a rescan of the /etc/inittab file()A、telinit -qB、init -rC、initab -sD、exec /etc/inittab
考题
Which of the following commands would an administrator use to add startup scripts to the system startup process()A、chitabB、vi /etc/inittabC、vi /etc/rc.dD、mkitab
考题
An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()A、DoSB、SYN floodC、port scanningD、IP address sweep
考题
单选题Which of the following commands would a system administrator use to initiate a rescan of the /etc/inittab file()A
telinit -qB
init -rC
initab -sD
exec /etc/inittab
考题
单选题An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()A
DoSB
SYN floodC
port scanningD
IP address sweep
考题
单选题Which of the following commands would an administrator use to add startup scripts to the system startup process()A
chitabB
vi /etc/inittabC
vi /etc/rc.dD
mkitab
考题
单选题Which of the following would an attacker use to footprint a system?()A
RADIUSB
Password crackerC
Port scannerD
Man-in-the-middle attack
考题
单选题Which of the following commands would a system administrator use to automate monitoring and notification of filling filesystems ()A
startcondrespB
filemonC
lsfsD
mount
考题
单选题A technician needs to manage a switch by using the management port on the back of the switch.Which of the following cables would the technician use?()A
StraightB
ConsoleC
CrossoverD
Loopback
考题
单选题A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()A
User ID/password fileB
Communications layerC
Client applicationsD
Operating system
考题
单选题Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()A
Network layer firewallB
Stateful inspection firewallC
Zone aware firewallD
Application layer firewall
考题
单选题A user has forgotten their BIOS password on their computer. Which of the following would atechnician use to allow the user access to their PC?()A
Remove the BIOS chip on the PCB
Re-flash the BIOSC
Run password cracking software on the users PCD
Set the password clear jumper on the motherboard
热门标签
最新试卷