网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()

  • A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
  • B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
  • C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.
  • D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.
  • E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
  • F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
  • G、None of the other alternatives apply

参考答案

更多 “ You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G、None of the other alternatives apply” 相关考题
考题 __________you suspect something, I may as well tell you the whole truth.A. SinceB. UntilC. AfterD. While

考题 You are unable to telnet to a router at address 203.125.12.1 from a workstation with the IP address 203.125.12.23. You suspect that there is a problem with the IP protocol stack in your PC. Which of the following actions is most likely to confirm your diagnosis?A. ping 127.0.0.0B. ping 203.125.12.1C. telnet 127.0.0.1D. ping 127.0.0.1E. tracert 203.125.12.1F. None of the above

考题 If you suspect a diesel engine is misfiring due to air leakage into the fuel system, you should begin looking for the leak at theA.fuel line connections to the cylinder injection valvesB.gasket surfaces of the fuel oil filtersC.discharge fittings of the fuel injector pumpsD.suction side of the fuel oil transfer pump

考题 You are the network administrator for . You administer a Windows Server 2003 computer named TestKing7. Users report that they experience poor performance when they access resources located on TestKing7. You suspect a disk bottleneck. You need to set up performance counters to monitor TestKing7.You need to decide which performance objects to monitor.Which two counters should you choose? ()(Each correct answer presents part of the solution. Select two.)A.LogicalDisk\%IdleTimeB.PhysicalDisk\%DiskTimeC.PhysicalDisk\Avg.DiskQueueLengthD.Memory\WriteCopies/secE.Memory\CommitLimit

考题 While testing a cargo tank,your oxygen indicator reads 25% oxygen in the tank. You would then ______.A.enter the tank safelyB.suspect the accuracy of the readingC.ventilate the tankD.test for nitrogen

考题 suspect.E01和suspect.001是从某嫌疑人硬盘中创建的两个证据镜像,鉴定人希望证明这两个镜像文件的哈希值是相同的。以下()文件包含Raw(dd)image的哈希值。A、Suspect.001.txtB、suspect.001.csvC、suspect.E01.csvD、suspect.E01.txt

考题 While troubleshooting a network connectivity issue, you suspect that a router may be missing a route, or may be receiving bad routing information to a destination. What command should you issue to view the route that the router will use to reach a given destination?()A、pingB、traceC、show ip routeD、show interfaceE、show cdp neighbors

考题 You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()A、by using triggersB、by using external tablesC、by using anonymous PL/SQL blocksD、by auditing all DML operations on the table

考题 You work as a database administrator for Supportcenter.cn. In a production environment, users complain about the slow response time when accessing the database. You have not optimized the memory usage of the Oracle instance and you suspect the problem to be with the memory. To which type of object would you refer to determine the cause of the slow response?()A、The trace fileB、The fixed viewsC、The data dictionary viewsD、The operating system log fieldsE、The dynamic performance views.

考题 You find that the execution time of reports in your datawarehouse application is significantly high. You suspect the lack of indexes to be the reason for the degradation in performance.  Which advisory component would you refer to, in order to determine the appropriate indexes?() A、Memory AdvisorB、Segment AdvisorC、SQL Access AdvisorD、Automatic Workload Repository (AWR)E、Automatic Database Diagnostic Monitor (ADDM)

考题 You are the network administrator for . You administer a Windows Server 2003 computer named TestKing7. Users report that they experience poor performance when they access resources located on TestKing7. You suspect a disk bottleneck. You need to set up performance counters to monitor TestKing7. You need to decide which performance objects to monitor. Which two counters should you choose? ()(Each correct answer presents part of the solution. Select two.)A、LogicalDisk/%IdleTimeB、PhysicalDisk/%DiskTimeC、PhysicalDisk/Avg.DiskQueueLengthD、Memory/WriteCopies/secE、Memory/CommitLimit

考题 单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()A by using triggersB by using Data PumpC by using external tablesD by using anonymous PL/SQL blocks

考题 单选题You work as a database administrator for Certkiller .com. You find that reports are running for a long time in your data warehousing applications. You suspect a lack of indexes is the reason for the performance degradation.  Which advisory component would you refer to, in order to determine the appropriate indexes?()A Memory AdvisorsB Segment AdvisorsC SQL Tuning and Access AdvisorsD Automated Workload Repository (AWR)E Automatic Database Diagnostic Monitor (ADDM)

考题 单选题If fuel tank levels are found to have increased after a grounding, you should suspect ().A a damaged pneumercator lineB a puncture, crack, or hole in the skin of the vesselC improper record keeping of fuel transfer activitiesD contamination of the contaminated steam supply system

考题 单选题You are unable to telnet to a router at address 203.125.12.1 from a workstation with the IP address 203.125.12.23. You suspect that there is a problem with your protocol stack. Which of the following actions is most likely to confirm your diagnosis?()A ping 127.0.0.0B ping 203.125.12.1C telnet 127.0.0.1D ping 127.0.0.1E tracert 203.125.12.1

考题 单选题If a diesel engine is difficult to start and operates with the engine temperatures lower than normal, you should suspect that the ().A compression pressures are below normalB lube oil is diluted with fuel oilC cranking speed is too lowD exhaust system is partially restricted

考题 单选题Some users report they cannot receive messages from some external senders.You suspect that there is some anti-spam activity blocking those messages.You need to identify what is blocking the messages.You will activate and review the logs of one of the following:()A Protocol loggingB Connectivity logsC Message trackingD Pipeline tracing

考题 单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()A by using triggersB by using external tablesC by using anonymous PL/SQL blocksD by auditing all DML operations on the table

考题 单选题If the water level dropped rapidly in the expansion tank of a closed diesel engine cooling water system, you should suspect a ().A loss of suction in the circulating pumpB leak in the primary cooling systemC broken raw water pump shaftD burned or cracked piston in one cylinder

考题 单选题You manage a SQL Server 2005 database that contains a table with many indexes.  You notice that data modification performance has degraded over time. You suspect that some of the indexes are unused. You need to identify which indexes were not used by any queries since the last time SQL Server 2005 started. Which dynamic management view should you use?()A sys.dm fts index populationB sys.dm exec query statsC sys. dm db index usage statsD sys.dm db index physical stats

考题 单选题You find that the execution time of reports in your datawarehouse application is significantly high. You suspect the lack of indexes to be the reason for the degradation in performance.  Which advisory component would you refer to, in order to determine the appropriate indexes?()A Memory AdvisorB Segment AdvisorC SQL Access AdvisorD Automatic Workload Repository (AWR)E Automatic Database Diagnostic Monitor (ADDM)

考题 单选题If an auxiliary diesel engine temperature is higher than normal ,but the thermostat is determined not to be defective you would suspect a /an ()A cavitation erosion in the water jacketsB excess corrosion inhibitor in the coolantC dirty jacket water coolerD defective turbocharger

考题 单选题A diesel engines crankcase oil level is found to be too high√ You should suspect that ().A the engine was over filledB there might be a fuel leakC there might be a water leakD all of the above

考题 单选题You work as a database administrator for Supportcenter.cn. In a production environment, users complain about the slow response time when accessing the database. You have not optimized the memory usage of the Oracle instance and you suspect the problem to be with the memory. To which type of object would you refer to determine the cause of the slow response?()A The trace fileB The fixed viewsC The data dictionary viewsD The operating system log fieldsE The dynamic performance views.

考题 单选题If you notice smoke coming fro the crankcase exhaust fan outlet of an operating diesel engine, you would suspect()A a cracked cylinder linerB clogged intake portsC broken piston ringsD a faulty head gasket

考题 单选题If you suspect a diesel engine is misfiring due to air leakage into the fuel system, you should begin looking for the leak at the ()A fuel line connections to cylinder injection valvesB gasket surfaces of the fuel oil filtersC discharge fitting of the fuel injector pumpsD suction side of the fuel oil tran

考题 单选题While inspecting the main bearings on a diesel engine you find impregnated dirt and scratches in the bearing surface you would, therefore, suspect that ()A the bearing had been overheatedB water was present in the oilC the lube oil was not being properly filteredD the maximum allowable bearing pressure had been exceeded

考题 单选题You find that the execution time of reports in your datawarehouse application is significantly high. You suspect the lack of indexes to be the reason for the degradation in performance. Which advisory component would you refer to, in order to determine the appropriate indexes?()A  Memory AdvisorB  Segment AdvisorC  SQL Access AdvisorD  Automatic Workload Repository (AWR)E  Automatic Database Diagnostic Monitor (ADDM)