网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate whatclassification of attack?()
- A、Sniffing attack
- B、Denial of service attack
- C、Port Scan attack
- D、Reconnaisance attack
- E、Spoofing attack
参考答案
更多 “BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate whatclassification of attack?()A、Sniffing attackB、Denial of service attackC、Port Scan attackD、Reconnaisance attackE、Spoofing attack” 相关考题
考题
You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()A. then rejectB. then discardC. then next filterD. then silent-drop
考题
You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()A. from source-portB. from source-addressC. from destination-addressD. from destination-port
考题
A service provider wants to prevent the repeat of a denial of service (DoS) attack that recently disabled Internet access for several thousand customers. Which Cisco solution best matches this business need?()A.Network securityB.Virtual Private Network (VPN)C.Wireless networkD.Content networking
考题
BCP(BestCommonPractices)38/RFC2827IngressandEgressPacketFilteringwouldhelpmitigatewhatclassificationofattack?()
A.SniffingattackB.DenialofserviceattackC.PortScanattackD.ReconnaisanceattackE.Spoofingattack
考题
Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()
A.denial of serviceB.brute forceC.reconnaissanceD.Trojan horse
考题
Which two network attack statements are true?()A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.B、Access attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.C、DoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.D、DoS attacks can consist of IP spoofing and DDoS attacks.E、IP spoofing can be reduced through the use of policy-based routing.F、IP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.
考题
Which type of attacks can be monitored and mitigated by CS-MARS using NetFlow data?()A、 Man-in-themiddle attackB、 Spoof attackC、 Land.C attackD、 Buffer OverflowE、 Day zero attackF、 Trojan Horse
考题
A service provider wants to prevent the repeat of a denial of service (DoS) attack that recently disabled Internet access for several thousand customers. Which Cisco solution best matches this business need?()A、Network securityB、Virtual Private Network (VPN)C、Wireless networkD、Content networking
考题
How would you characterize the source and type in a denial of service attack on a router?()A、By perfornubg a show ip interface to see the type and source of the attack based upon the access-listmatchesB、By performing a show interface to see the transmitted load "txload" and receive load "rxload" ;if the interface utilization is not maxed out ,there is no attack underwayC、By setting up an access-list to permit all ICMP,TCP,and UDP traffic with the log or log-input commands,then use the show access-list and show log commands to determine the type and sourceof attackD、By applying an access-list to all incoming and outgoing interfaces,turning off route-cache on all interfaces,then,when telnetting into the router perform a debug IP packet detail
考题
Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()A、denial of serviceB、brute forceC、reconnaissanceD、Trojan horse
考题
A service provider wants to prevent the repeat of a denial of service (DoS) attack that recently disabled Internet access for several thousand customers. Which Cisco solution best matches this business need?()A、Network securityB、Wireless networkC、Content networkingD、Virtual Private Network (VPN)
考题
You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()A、from source-portB、from source-addressC、from destination-addressD、from destination-port
考题
When implementing best practices for IP Source Address Spoofing and Defeating Denial of Service Attacks with IP SourceAddress Spoofing, what RFC is commonly usedto protect your network?()A、 RFC 1149B、 RFC 3704C、 RFC 1918D、 RFC 2827
考题
What are BCP 38 (Best Common Practices 38)/RFC 2827 Ingress Packet Filtering Principles?()A、Filter Smurf ICMP packets.B、Filter as close to the core as possibleC、Filter as close to the edge as possibleD、Filter as precisely as possibleE、Filter both source and destination where possible
考题
What are four methods used by hackers? ()A、footprint analysis attackB、privilege escalation attackC、buffer Unicode attackD、social engineering attackE、front door attacksF、Trojan horse attack
考题
You are the network administrator of a Layer 3 switched network. Users in one VLAN are complaining thataccess to the server VLAN is very slow from time to time. Traffic in the local VLAN works without any issue,and users in other VLANs do not have any complaint to reach the server VLAN. What is most likely thecause of this issue?()A、routing issueB、denial-of-service attackC、MAC floodingD、spanning-tree recalculationE、Layer 2 loopF、ARP spoofing attack
考题
TippingPoint IPS对应用保护的过滤器分为哪几类?()A、Attack Pretection,Reconnaissance,Security Policy,InformationalB、Attack Pretection,Scan,Security Policy,InformationalC、Attack Pretection,Reconnaissance,MisuserAbuse,InformationalD、Attack Pretectio,Scan,Security Policy,MisuserAbuse
考题
Observe the following options carefully, which two attacks focus on RSA? ()A、BPA attackB、Adaptive chosen ciphertext attackC、DDoS attackD、Man-in-the-middle attack
考题
Which firewall best practices can help mitigate worm and other automated attacks?()A、Segment security zonesB、Restrict access to firewallsC、Use logs and alertsD、Set connection limits
考题
Which of the following would an attacker use to footprint a system?()A、RADIUSB、Password crackerC、Port scannerD、Man-in-the-middle attack
考题
You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()A、then rejectB、then discardC、then next filterD、then silent-drop
考题
Where do you configure SCREEN options?()A、zones on which an attack might arriveB、zones you want to protect from attackC、interfaces on which an attack might arriveD、interfaces you want to protect from attack
考题
单选题BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate whatclassification of attack?()A
Sniffing attackB
Denial of service attackC
Port Scan attackD
Reconnaisance attackE
Spoofing attack
考题
单选题When implementing best practices for IP Source Address Spoofing and Defeating Denial of Service Attacks with IP SourceAddress Spoofing, what RFC is commonly usedto protect your network?()A
RFC 1149B
RFC 3704C
RFC 1918D
RFC 2827
考题
单选题How would you characterize the source and type in a denial of service attack on a router?()A
By perfornubg a show ip interface to see the type and source of the attack based upon the access-listmatchesB
By performing a show interface to see the transmitted load txload and receive load rxload ;if the interface utilization is not maxed out ,there is no attack underwayC
By setting up an access-list to permit all ICMP,TCP,and UDP traffic with the log or log-input commands,then use the show access-list and show log commands to determine the type and sourceof attackD
By applying an access-list to all incoming and outgoing interfaces,turning off route-cache on all interfaces,then,when telnetting into the router perform a debug IP packet detail
考题
单选题Which type of attacks can be monitored and mitigated by CS-MARS using NetFlow data?()A
Man-in-themiddle attackB
Spoof attackC
Land.C attackD
Buffer OverflowE
Day zero attackF
Trojan Horse
考题
多选题What are BCP 38 (Best Common Practices 38)/RFC 2827 Ingress Packet Filtering Principles?()AFilter Smurf ICMP packets.BFilter as close to the core as possibleCFilter as close to the edge as possibleDFilter as precisely as possibleEFilter both source and destination where possible
热门标签
最新试卷