网友您好, 请在下方输入框内输入要搜索的题目:
A.Strongmatrix
B.Projectized
C.Projectcoordinator
D.Weakmatrix
The most widely used LAN system is ______ which adopts a form. of access known as CSMA-CD.
A.Ethemet
B.ATM
C.FDDI
D.Wireless
解析:使用最为广泛的局域网是采用CSMA.CD协议的以太网。
题库
1. What extracurricular activities were you involved in? What made you choose those? Which of them did you most enjoy, and why?
In which form of projects origination would the project manager be likely to exercise the most control over Project resources.()
- A、Strongmatrix
- B、Projectized
- C、Projectcoordinator
- D、Weakmatrix
正确答案:B
Which of the following network cable types is MOST often used in environments where physicalsecurity of the data is the top priority?()
- A、UTP
- B、Coaxial
- C、Fiber optic
- D、STP
正确答案:C
思科网络工程师题库1-200Q1.In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A.SmurfB.distributed denial of serviceC.cross-site scriptingD.rootkit exploit Answer: C Explanation:Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. The data is usually gathered in the form of a hyperlink which contains malicious content within it. The user will most likely click on this link from another website, instant message, or simply just reading a web board or email message.Usually the attacker will encode the malicious portion of the link to the site in HEX (or other encoding methods) so the request is less suspicious looking to the user when clicked on. For example the code below is written in hex:Click Hereis equivalent to:Click HereNote: In the format &#xhhhh, hhhh is the code point in hexadecimal form.Q2.Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?A.user input validation in a web page or web applicationB.Linux and Windows operating systemsC.databaseD.web page images Answer: A Explanation:SQL injection usually occurs when you ask a user for input, like their username/userid, but the user gives (injects) you an SQL statement that you will unknowingly run on your database. For example:Look at the following example, which creates a SELECT statement by adding a variable (txtUserId) to a select string.The variable is fetched from user input (getRequestString):txtUserId = getRequestString(UserId);txtSQL = SELECT * FROM Users WHERE UserId = + txtUserId; If user enter something like this: 100 OR 1=1 then the SQL statement will look like this:SELECT * FROM Users WHERE UserId = 100 OR 1=1;The SQL above is valid and will return ALL rows from the Users table, since OR 1=1 is always TRUE. A hacker might get access to all the user names and passwords in this database. Q3.Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)A.Check integer, float, or Boolean string parameters to ensure accurate values.B.Use prepared statements and parameterized queries.C.Secure the connection between the web and the app tier.D.Write SQL code instead of using object-relational mapping libraries.E.Block SQL code execution in the web application database login. Answer: AB Q4.Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two)A.Patch for cross-site scripting.B.Perform backups to the private cloud.C.Protect against input validation and character escapes in the endpoint.D.Install a spam and virus email filter.E.Protect systems with an up-to-date antimalware program. Answer: DEExplanation:Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login information, or to install malware on the victims machine.Q5.Which two mechanisms are used to control phishing attacks? (Choose two)A.Enable browser alerts for fraudulent websites.B.Define security group memberships.C.Revoke expired CRL of the websites.D.Use antispyware software.E.Implement email filtering techniques. Answer: AEQ6.Which two behavioral patterns characterize a ping of death attack? (Choose two)A.The attack is fragmented into groups of 16 octets before transmission.B.The attack is fragmented into groups of 8 octets before transmission.C.Short synchronized bursts of traffic are used to disrupt TCP connections.D.Malformed packets are used to crash systems.E.Publicly accessible DNS servers are typically used to execute the attack. Answer: BDExplanation:Ping of Death (PoD) is a type of Denial of Service (DoS) attack in which an attacker attempts to crash, destabilize, or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping command.A correctly-formed ping packet is typically 56 bytes in size, or 64 bytes when the ICMP header is considered, and 84 including Internet Protocol version 4 header. However, any IPv4 packet (including pings) may be as large as 65,535 bytes. Some computer systems were never designed to properly handle a ping packet larger than the maximum packet size because it violates the Internet Protocol documented Like other large but well-formed packets, a ping of death is fragmented into groups of 8 octets before transmission. However, when the target computer reassembles the malformed packet, a buffer overflow can occur, causing a system cr
Which of the following is the MOST important concern when deciding on the servers locations?()
- A、Form factor
- B、Inadequate air flow
- C、Too high from ground level
- D、Difficulty of physical access
正确答案:B
Which of the following technologies is the MOST secure form of wireless encryption?()
- A、SSL
- B、WPA
- C、WEP
- D、TLS
正确答案:B
Which of the following factors is the MOST important to consider when choosing an uninterruptible power supply (UPS) for a single server? ()
- A、 UPS form factor
- B、 Server form factor
- C、 Server power supplys wattage rating
- D、 Desired runtime
正确答案:D
Where do you configure SCREEN options?()
- A、zones on which an attack might arrive
- B、zones you want to protect from attack
- C、interfaces on which an attack might arrive
- D、interfaces you want to protect from attack
正确答案:A
It is used in the marketing of most industrial products.
It is often used in cases where there is a large program target.
It is not economically feasible for most marketing programs.
It is used only for products for which there are many potential customers.
文章第二段提到,有一种特殊情况,当产品的消费者很容易辨别并且很少时,比如说啤酒瓶高速填料,那么,直销在经济上就可行,但是它的市场消费者只局限于program target类型的消费者。接着在文章的第三段提到,“most consumer-goods markets”完全不同,只有“mass marketing”才能在经济上可行。因此正确答案为C项。
更多 “思科网络工程师题库3” 相关考题
- 在房屋面积的测算过程中,按照一半计算面积的是()。A、房屋内在2.20m以上的夹层B、层高在2.20m以上的地下室C、永久性结构有上盖的室外楼梯D、与房屋相连有上盖无柱的走廊
- 柴油机的进气门和排气门都有一个提前角和滞后角,目的是为了进气更充分,排气更干净。
- 属于财产课税的税种有()A、房产税B、契税C、土地使用税D、车船使用税E、证券交易印花税
- 输入流量和泵量一定时,液动锤的冲击频率与冲击功成反比。
- 身兼领导者和管理者的角色是()A、董事长B、副董事长C、董事会成员D、总裁
- 进入机场应带安全帽,工作服作到“三紧一严”。
- 容积率是指总建筑面积与建设用地面积之比值。
- 人造金刚石()A、“目”数值越大,表示金刚石颗粒越粗B、常用作孕镶金刚石钻头C、金刚石在胎体中体积浓度为25%时,称金刚石浓度为100%D、可用电镀方法制作扩孔器
- 古今中外,不论社会制度有何不同,税收都具有()A、公平B、效率C、强制性D、无偿性E、固定性
- 在下列方法,特别适用于财政支出中有关投资性支出项目分析的是()A、企业投资财务分析法B、“成本——效益”法C、最低费用选择法D、“公共劳务”收费法