网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Birthday attacks are used against which of the following?()
A

 digital signatures

B

 symmetric ciphering

C

 hashalgoritms

D

 asymmetric ciphering

E

 digital certificates


参考答案

参考解析
解析: 暂无解析
更多 “单选题Birthday attacks are used against which of the following?()A  digital signaturesB  symmetric cipheringC  hashalgoritmsD  asymmetric cipheringE  digital certificates” 相关考题
考题 Which of the following is "承兑交单"?A、Bill of exchangeB、Document against acceptanceC、StatementD、Cost price

考题 Which of the following channels, when used in close proximity to one another, provide the BESTprotection against crosstalk?() A. 1 and 11B. 2 and 10C. 6 and 1D. 6 and 11

考题 Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?() A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS

考题 Which of the following security mitigation techniques is the MOST effective against zero-day attacks?() A.Update antivirus definitionsB.MAC filteringC.Effective security policiesD.User awareness training

考题 The Company is concerned about Layer 2 security threats.  Which statement is true about these  threats? ()A、 MAC spoofing attacks allow an attacking device to receive frames intended for a different  network host.B、 Port scanners are the most effective defense against dynamic ARP inspection.C、 MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable  attack points.D、 Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP  snooping attacks.E、 DHCP snooping sends unauthorized replies to DHCP queries.F、 ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.G、 None of the other alternatives apply.

考题 Which of the following statements that describe Diffie Hellman Key exchange are correct? ()A、 A DH key exchange is an algorithm that utilizes asymmetric cryptographic keys.B、 The DH key exchange is used to establish a shared secret over an insecure medium during an IPSec phase 1 exchange.C、 The DH exchange is susceptible to man-in-the-middle attacks.D、 The DH exchange is used to authenticate the peer device duringan IPSec phase 1 exchange.E、A DH exchange provides Perfect Forward Secrecy (PFS).

考题 A customer wants to check whether they have the necessary tools enabled to prevent intrusions andvirus attacks on a Windows Vista workstation. Which of the following tools can be used to display thecurrent configuration? ()A、Security CenterB、Event Viewer Security logC、Windows DefenderD、Windows Firewall

考题 Birthday attacks are used against which of the following?()A、 digital signaturesB、 symmetric cipheringC、 hashalgoritmsD、 asymmetric cipheringE、 digital certificates

考题 Observe the following options carefully, which two attacks focus on RSA? ()A、BPA attackB、Adaptive chosen ciphertext attackC、DDoS attackD、Man-in-the-middle attack

考题 Which of the following channels, when used in close proximity to one another, provide the BESTprotection against crosstalk?()A、1 and 11B、2 and 10C、6 and 1D、6 and 11

考题 Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?()A、DoSB、SmurfC、Man-in-the-middleD、Phishing

考题 Which of the following utilities are used to choose which programs run at startup? ()A、SFCB、SETDEBUGC、MSCONFIGD、REGEDIT

考题 Which of the following protocols is used by thin clients?()A、IPXB、NetBIOSC、RDPD、UDP

考题 If a user attempts to go to a website and notices the URL has changed, which of the following attacks is MOST likely the cause?()A、DLL injectionB、DDoS attackC、DNS poisoningD、ARP poisoning

考题 A Stateful firewall is MOST useful in protecting against which of the following network scans?()A、PINGB、UDPC、XmasD、ACK

考题 Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS

考题 Which of the following commands should be used to report statistics on network protocols used by the system?()A、 lsattrB、 pstatC、 netstatD、 ifconfig

考题 单选题Which of the following channels, when used in close proximity to one another, provide the BESTprotection against crosstalk?()A 1 and 11B 2 and 10C 6 and 1D 6 and 11

考题 单选题Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()A Update antivirus definitionsB MAC filteringC Effective security policiesD User awareness training

考题 单选题Which of the following is primarily used for VoIP?()A TLSB RDFC NTPD RTP

考题 单选题A computer’s case fan protects against which of the following environmental concerns?()A PressureB HeatC Brown outD Cold

考题 单选题Which of the following AIX commands is used to produce an input file that is then used to generate a NIS map file?()A wdadmB mrgpwdC makedbmD mkpasswd

考题 单选题The Company is concerned about Layer 2 security threats.  Which statement is true about these  threats? ()A  MAC spoofing attacks allow an attacking device to receive frames intended for a different  network host.B  Port scanners are the most effective defense against dynamic ARP inspection.C  MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable  attack points.D  Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP  snooping attacks.E  DHCP snooping sends unauthorized replies to DHCP queries.F  ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.G  None of the other alternatives apply.

考题 单选题Client exclusion policies are used to mitigate which of the following attacks?()A dictionaryB bit-flip and replayC mac spoofingD man-in-the-middle

考题 单选题Which of the following chemicals will be used where protection against caustic cracking is required in boiler treatment?()A Sodium hydroxideB Sodium carbonateC Sodium nitrateD Sodium polyphosphate

考题 多选题Which of the following comparison of Control Plane Policing (CoPP) with Receive ACL(Racl) is correct?()ACoPP protects against IP spoofing;Racl protects against DoS attacks.BCoPP can not use named access lists;Racl can use named access listsCCoPP applies to a dedicated control plane interface;Racl applies to all interfaces.DCoPP needs a AAA server,Racl does not need a AAA serverECoPP supports rate limits;Racl does not support rate limits

考题 多选题Which two statements about the use of SCREEN options are correct?()ASCREEN options are deployed at the ingress and egress sides of a packet flow.BAlthough SCREEN options are very useful, their use can result in more session creation.CSCREEN options offer protection against various attacks at the ingress zone of a packet flow.DSCREEN options examine traffic prior to policy processing, thereby resulting in fewer resouces used formalicious packet processing.