网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()

A.denial of service

B.brute force

C.reconnaissance

D.Trojan horse


参考答案

更多 “ Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?() A.denial of serviceB.brute forceC.reconnaissanceD.Trojan horse ” 相关考题
考题 Which IDP policy action closes the connection and sends an RST packet to both the client and the server?() A. close-connectionB. terminate-connectionC. close-client-and-serverD. terminate-session

考题 Once the TCP connection is established, which message type initiates the BGP peering process?() A. OpenB. ActiveC. UpdateD. Notification

考题 Which Packet Flow Acceleration feature is most effective for short-lived TCP sessions?() A. Active Flow PipeliningB. Fast Connection SetupC. TCP Acceleration (AFP)D. Forward Error Correction

考题 A user opens a webpage that requires the transmission of packets from the Web server to the client‘s browser. The packets transmitted from the Web server to the client exceed the smallest MTU value on the communications path.Which two protocol functions allow this type of communication?()A. packet segmentationB. serialized checkingC. packet sequencingD. parallel checking

考题 Which of the following network topologies is characterized by a central server and uniqueconnections to all clients? () A.StarB.BusC.MeshD.Ring

考题 A user reports being occasionally disconnected from the server. Which of the following tools couldthe technician use to determine if it is the client or the server that is dropping the connection?() A. Packet snifferB. MultimeterC. Load balancerD. Throughput tester

考题 Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server()。 A.denial of serviceB.brute forceC.reconnaissanceD.Trojan horse

考题 A user opens a webpage that requires the transmission of packets from the Web server to the client's browser. The packets transmitted from the Web server to the client exceed the smallest MTU value on the communications path. Which two protocol functions allow this type of communication?()A、packet segmentationB、serialized checkingC、packet sequencingD、parallel checking

考题 Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()A、close-connectionB、terminate-connectionC、close-client-and-serverD、terminate-session

考题 When running IP SLA, which application type should be used if you want to know round-trip delay, jitter, and packet loss for the full path?()A、ICMP path echoB、UDP echoC、ICMP path jitterD、Application Performance MonitorE、TCP connect

考题 What are two reasons for packet loss on a VoIP connection?()A、serialization delayB、overrunC、full buffers and queuesD、propagation delayE、shaping delayF、TCP header errors

考题 Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server()。A、denial of serviceB、brute forceC、reconnaissanceD、Trojan horse

考题 A web server is running correctly but sending a RST packet to any client trying to connect using HTTP on TCP port 80. Which of the following tools should be used to determine the listening port of the web server?()A、RouteB、IfconfigC、NetstatD、Nslookup

考题 A user reports being occasionally disconnected from the server. Which of the following tools couldthe technician use to determine if it is the client or the server that is dropping the connection?()A、Packet snifferB、MultimeterC、Load balancerD、Throughput tester

考题 Which of the following network topologies is characterized by a central server and uniqueconnections to all clients? ()A、StarB、BusC、MeshD、Ring

考题 Which Packet Flow Acceleration feature is most effective for short-lived TCP sessions?()A、Active Flow PipeliningB、Fast Connection SetupC、TCP Acceleration (AFP)D、Forward Error Correction

考题 Once the TCP connection is established, which message type initiates the BGP peering process?()A、OpenB、ActiveC、UpdateD、KeepaliveE、Notification

考题 Your company has a server that runs Windows Server 2008 R2. The server is configured as a remoteaccess server. The external firewall has TCP port 80 and TCP port 443 open for remoteconnections. You have a home computer that runs Windows 7. You need to establish secure remote accessconnection from the home computer to the remote access server.  Which type of connection should you configure? ()A、IPSECB、L2TPC、PPTPD、SSTP

考题 You are creating a shared Internet connection on your Windows 2000 Professional computer.  You want to enable other computers on the LAN to be able to access only HTTP and FTP sites on the Internet.   What should you do?()A、Configure your shared Internet connection to disable LCP extensions.B、Configure you shared Internet connection to disable on-demand dialing.C、Create an Internet Connection Sharing application type for HTTP to use remote server port 25.D、Create an Internet Connection Sharing application type for HTTP to use remote server port 80.E、Create an Internet Connection Sharing application type for FTP to use remote server port 21.F、Create an Internet Connection Sharing application type for FTP to use remote server port 72.

考题 多选题You are creating a shared Internet connection on your Windows 2000 Professional computer.  You want to enable other computers on the LAN to be able to access only HTTP and FTP sites on the Internet.   What should you do?()AConfigure your shared Internet connection to disable LCP extensions.BConfigure you shared Internet connection to disable on-demand dialing.CCreate an Internet Connection Sharing application type for HTTP to use remote server port 25.DCreate an Internet Connection Sharing application type for HTTP to use remote server port 80.ECreate an Internet Connection Sharing application type for FTP to use remote server port 21.FCreate an Internet Connection Sharing application type for FTP to use remote server port 72.

考题 单选题An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()A DoSB SYN floodC port scanningD IP address sweep

考题 单选题How would you characterize the source and type in a denial of service attack on a router?()A By perfornubg a show ip interface to see the type and source of the attack based upon the access-listmatchesB By performing a show interface to see the transmitted load txload and receive load rxload ;if the interface utilization is not maxed out ,there is no attack underwayC By setting up an access-list to permit all ICMP,TCP,and UDP traffic with the log or log-input commands,then use the show access-list and show log commands to determine the type and sourceof attackD By applying an access-list to all incoming and outgoing interfaces,turning off route-cache on all interfaces,then,when telnetting into the router perform a debug IP packet detail

考题 单选题Once the TCP connection is established, which message type initiates the BGP peering process?()A OpenB ActiveC UpdateD KeepaliveE Notification

考题 单选题Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()A close-connectionB terminate-connectionC close-client-and-serverD terminate-session

考题 单选题You are the network administrator for Company.  You configure an L2TP virtual private network (VPN) connection on your Windows 2000 Professional computer to remotely access Company’s Windows 2000 Routing and Remote Access server. The server is configured to accept a limited number of both PPTP and L2TP connections. You configure the VPN connection to use MS-CHAP v2 only and to require encryption. You also configure TCP/IP to obtain an IP address automatically. Many times when you try to connect, you are unable to because all of the ports are in use. Other times you are able to connect successfully.   You want to increase your chances of being able to connect to the server while ensuring that the most secure connection type available is used.   What should you do? ()A Enable the VPN connection to use MS-CHAP.B Specify a TCP/IP address in the Network properties.C Change the data encryption setting to Optional Encryption.D Configure the Type of VPN server I am calling to be Automatic.E Configure the Type of VPN server I am calling to be PPTP.

考题 单选题Which Packet Flow Acceleration feature is most effective for short-lived TCP sessions?()A Active Flow PipeliningB Fast Connection SetupC TCP Acceleration (AFP)D Forward Error Correction

考题 单选题Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()A denial of serviceB brute forceC reconnaissanceD Trojan horse