网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()
A
Phishing scam
B
Social engineering
C
Man-in-the-Middle
D
Shoulder surfing
参考答案
参考解析
解析:
暂无解析
更多 “单选题A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()A Phishing scamB Social engineeringC Man-in-the-MiddleD Shoulder surfing” 相关考题
考题
单选题Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()A
Update antivirus definitionsB
MAC filteringC
Effective security policiesD
User awareness training
考题
单选题A technician needs to add network capacity. However, when plugging a second switch into the first switch, there is no link light. Which of the following is the cause of this situation?()A
The switches are not stackableB
The cable was not wired using 568AC
The cable needs to be a crossover cableD
The switches have IGMP snooping enabled
考题
单选题Which of the following devices is used to connect a WAN to a LAN?()A
Basic routerB
Basic switchC
BridgeD
Repeater
考题
单选题Which of the following network protocols is used to ensure consistent time across network devices on the domain?()A
NTPB
FTPC
RTPD
IGMP
考题
单选题An administrator attempts to open a web page and sees the following error: 'Error 404: Page not found'. The administrator then uses the ping command and finds that the default gateway cannot be pinged. At which of the following layers does the problem MOST likely reside?()A
Layer 1B
Layer 4C
Layer 5D
Layer 7
考题
单选题A user on a network cannot access any network resources. The link light on the computer showsthat a connection is present. Which of the following is the MOST likely cause of the problem?()A
The wrong cable type has been used.B
. IDS has shut down the computer's switch port.C
The port on the switch is configured incorrectlyD
Spanning tree protocol was implemented.
考题
单选题Which of the following does not affect security on a wireless access point?()A
EncryptionB
DHCPC
PasswordD
SSID
考题
单选题A Stateful firewall is MOST useful in protecting against which of the following network scans?()A
PINGB
UDPC
XmasD
ACK
考题
单选题A company is about to install a second network connect on with a new ISP. Which of the followingrouting protocols is the BEST choice?()A
IS-ISB
BGPC
OSPFD
RIP
考题
单选题Which of the following is used to create multiple networks from one large network?()A
PATB
NATC
MulticastD
Subnetting
热门标签
最新试卷