网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server()。

  • A、denial of service
  • B、brute force
  • C、reconnaissance
  • D、Trojan horse

参考答案

更多 “Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server()。A、denial of serviceB、brute forceC、reconnaissanceD、Trojan horse” 相关考题
考题 A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?() A. It enables an attacker to perform an IP sweep of devices.B. It enables a hacker to know which operating system the system is running.C. It can overflow the session table to its limit, which can result in rejection of legitimate traffic.D. It creates a ping of death and can cause the entire network to be infected with a virus.

考题 Which router translates the Type 7 LSAs into Type 5 LSAs, according to RFC 1587 (OSPF NSSAOption) in an OSPF NSSA with more than one ABR?() A. The router receiving the route translates the Type 7 LSA into a Type 5 LSA.B. The ABR with the lowest router ID translates all Type 7 LSAs into Type 5 LSAs.C. The ABR with the highest router ID translates all Type 7 LSAs into Type 5 LSAs.D. All ABRs translate the Type 7 LSAs into Type 5 LSAs depending on which one has the lowest cost to the route.

考题 Which two LSA types can be used to aggregate inter-area routes?() A. Type 2B. Type 3C. Type 4D. Type 5E. Type 9

考题 Which LSA is flooded across area boundaries?() A.Type1B.Type2C.Type3D.Type5

考题 Which of the following security threats involves making phone calls?() A.PhishingB.VishingC.DDoSD.Xmas attack

考题 Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?() A.denial of serviceB.brute forceC.reconnaissanceD.Trojan horse

考题 Which OSPF LSA is used to support MPLS traffic engineering?()A、opaque LSA (Type 8)B、opaque LSA (Type 9)C、link LSA (Type 1)D、network LSA (Type 2)E、opaque LSA (Type 10)

考题 In a VoIP network, which type of interface would an analog fax machine connect to?()A、 Type 1B、 Type 2C、 FXSD、 FXOE、 EM

考题 which one of the following statements would lee include in an agent to limit the documents processed by the agent to those for which the value of the type field is "action"? ()A、FIELD Type :="action"     B、SELECT Type ="action" C、SELECT Type :="action "      D、@if (type="action";@success;@failure) 

考题 Which OSPF area type allows for the flooding of a Type 7 LSA?()A、stubB、transitC、borderD、not-so-stubby

考题 Which two LSA types can be used to aggregate inter-area routes?()A、Type 2B、Type 3C、Type 4D、Type 5E、Type 9

考题 Which three LSA types can be flooded within an OSPF stub area?()A、Type 1B、Type 2C、Type 3D、Type 5E、Type 7

考题 Which LSA is flooded across area boundaries?()A、Type1B、Type2C、Type3D、Type5

考题 Routes redistributed into an OSPF ASBR are which LSA type?()A、LSA type 1B、LSA type 2C、LSA type 3D、LSA type 4E、LSA type 5F、LSA type 6

考题 Which of the following security threats involves making phone calls?()A、PhishingB、VishingC、DDoSD、Xmas attack

考题 Which LSA is flooded across area boundaries?()A、Type 1B、Type 2C、Type 3D、Type 5E、Type 7

考题 问答题Many have come to believe that Type A's are at a much higher risk of suffering heart attack or dying of heart disease than others.

考题 单选题Which OSPF LSA is used to support MPLS traffic engineering?()A opaque LSA (Type 8)B opaque LSA (Type 9)C link LSA (Type 1)D network LSA (Type 2)E opaque LSA (Type 10)

考题 单选题An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()A DoSB SYN floodC port scanningD IP address sweep

考题 单选题The show ip ospf database external command displays information about which OSPF LSA type?()A LSA type 1B LSA type 2C LSA type 7D LSA type 3E LSA type 9F LSA type 5

考题 单选题A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()A It enables an attacker to perform an IP sweep of devices.B It enables a hacker to know which operating system the system is running.C It can overflow the session table to its limit, which can result in rejection of legitimate traffic.D It creates a ping of death and can cause the entire network to be infected with a virus.

考题 单选题How would you characterize the source and type in a denial of service attack on a router?()A By perfornubg a show ip interface to see the type and source of the attack based upon the access-listmatchesB By performing a show interface to see the transmitted load txload and receive load rxload ;if the interface utilization is not maxed out ,there is no attack underwayC By setting up an access-list to permit all ICMP,TCP,and UDP traffic with the log or log-input commands,then use the show access-list and show log commands to determine the type and sourceof attackD By applying an access-list to all incoming and outgoing interfaces,turning off route-cache on all interfaces,then,when telnetting into the router perform a debug IP packet detail

考题 单选题Which router translates the Type 7 LSAs into Type 5 LSAs, according to RFC 1587 (OSPF NSSAOption) in an OSPF NSSA with more than one ABR?()A The router receiving the route translates the Type 7 LSA into a Type 5 LSA.B The ABR with the lowest router ID translates all Type 7 LSAs into Type 5 LSAs.C The ABR with the highest router ID translates all Type 7 LSAs into Type 5 LSAs.D All ABRs translate the Type 7 LSAs into Type 5 LSAs depending on which one has the lowest cost to the route.

考题 单选题Which LSA is used in JUNOS software when a OSPF router restarts?()A LSA Type 6B LSA Type 9C LSA Type 10D LSA Type 11

考题 单选题which one of the following statements would lee include in an agent to limit the documents processed by the agent to those for which the value of the type field is "action"? ()A FIELD Type :=action     B SELECT Type =action C SELECT Type :=action       D @if (type=action;@success;@failure) 

考题 单选题Where do you configure SCREEN options?()A zones on which an attack might arriveB zones you want to protect from attackC interfaces on which an attack might arriveD interfaces you want to protect from attack

考题 单选题Routes redistributed into an OSPF ASBR are which LSA type?()A LSA type 1B LSA type 2C LSA type 3D LSA type 4E LSA type 5F LSA type 6