网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which type of attacks can be monitored and mitigated by CS-MARS using NetFlow data?()
A

 Man-in-themiddle attack

B

 Spoof attack

C

 Land.C attack

D

 Buffer Overflow

E

 Day zero attack

F

 Trojan Horse


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which type of attacks can be monitored and mitigated by CS-MARS using NetFlow data?()A  Man-in-themiddle attackB  Spoof attackC  Land.C attackD  Buffer OverflowE  Day zero attackF  Trojan Horse” 相关考题
考题 Which of the following security mitigation techniques is the MOST effective against zero-day attacks?() A.Update antivirus definitionsB.MAC filteringC.Effective security policiesD.User awareness training

考题 Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?() A.denial of serviceB.brute forceC.reconnaissanceD.Trojan horse

考题 Which type of attacks can be monitored and mitigated by CS-MARS using NetFlow data?()A、 Man-in-themiddle attackB、 Spoof attackC、 Land.C attackD、 Buffer OverflowE、 Day zero attackF、 Trojan Horse

考题 Which two are correct functions of the Cisco Anomaly Guard and Detector for preventing DDOS attacks? ()A、 uses Netflow data for anomaly detectionsB、 builds baseline profilesof normal operating conditions, enablingrapid identification of unusual activity that indicates an attackC、 accept events inputs from different network devicesvia syslog, SDEE and SNMPD、 dynamic diversion redirects and cleans only traffic destined for targeted devices, allowing unaffectedtraffic toflow freely and ensuring business continuityE、 pushes ACLs to network devices to only block the malicious trafficF、 using topology and configuration awareness, events from different devices are correlatedand attacks mitgitations are performed at the optimal location

考题 Cisco IOS NetFlow gathers data that can be used in which three of these? ()A、 accountingB、 authenticationC、 authorizationD、 network monitoringE、 network planning

考题 Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()A、Update antivirus definitionsB、MAC filteringC、Effective security policiesD、User awareness training

考题 Which Cisco security software product mitigates Day Zero attacks on desktops and servers - stopping known and unknown attacks without requiring reconfigurations or updates on the endpoints?()A、 Cisco Secure Desktop (CSD)B、 NAC Appliance Agent (NAA)C、 Cisco SecurityAgent (CSA)D、 SSLVPN Client (SVC)E、 Cisco TrustAgent (CTA)

考题 Which four statements about NetFlow are true?()A、NetFlow records bidirectional IP traffic flow.B、NetFlow export can be implemented over IPv4.C、NetFlow export can be implemented over IPv6.D、NetFlow records multicast IP traffic flow.E、NetFlow records ingress traffic.F、NetFlow records egress traffic.

考题 As an experienced network administrator, you are asked to troubleshoot a QoS problem. In which way might the Cisco NetFlow be helpful during the troubleshooting process?()A、NetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.B、NetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.C、NetFlow can be configured to identify voice and video traffic flows and place them into a low-latency queue for expedited processing.D、NetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.

考题 BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate whatclassification of attack?()A、Sniffing attackB、Denial of service attackC、Port Scan attackD、Reconnaisance attackE、Spoofing attack

考题 Which statement is true about a Smurf attack?()A、It sends ping requests in segments of an invalid sizeB、It intercepts the third step in a TCP three-way handshake to hijack a sessionC、It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemD、It uses Trojan horse applications to create a distributed collection of "zombie" computers, which can beused to launch a coordinated DDoS attack

考题 What are four methods used by hackers? ()A、footprint analysis attackB、privilege escalation attackC、buffer Unicode attackD、social engineering attackE、front door attacksF、Trojan horse attack

考题 Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server()。A、denial of serviceB、brute forceC、reconnaissanceD、Trojan horse

考题 Which statement is correct regarding NBAR and NetFlow?()A、NetFlow uses five key fields for the flowB、NBAR examines data in Layers 3 and 4C、NetFlow examines data in Layers 3 and 4D、NBAR examines data in Layers 2 through 4E、NetFlow examines data in Layers 2 through 4

考题 Observe the following options carefully, which two attacks focus on RSA? ()A、BPA attackB、Adaptive chosen ciphertext attackC、DDoS attackD、Man-in-the-middle attack

考题 If a user attempts to go to a website and notices the URL has changed, which of the following attacks is MOST likely the cause?()A、DLL injectionB、DDoS attackC、DNS poisoningD、ARP poisoning

考题 When using IBM Tivoli Monitoring Universal Agents monitors, which  three IBM Tivoli Workload Scheduler processes can be monitored by  default? ()A、 reptrB、 writerC、 netmanD、 monmanE、 batchmanF、 appservman

考题 The WebSphere Application Server provides a Dynamic Cache Monitor.  Which of the following can be monitored using this tool?()A、Servlet Response TimesB、Cache StatisticsC、Database Connection Pool StatisticsD、Disk Statistics

考题 Which two data types can be converted to LOBs using an ALTER TABLE… MODIFY command?()A、RAWB、LONGC、VARCHARD、LONG RAW

考题 Which three statements are true regarding the data types in Oracle Database 10g/11g?()A、Only one LONG column can be used per table B、A TIMESTAMP data type column stores only time values with fractional seconds C、The BLOB data type column is used to store binary data in an operating system file D、The minimum column width that can be specified for a VARCHAR2 data type column is one E、The value for a CHAR data type column is blank-padded to the maximum defined column width

考题 多选题When using IBM Tivoli Monitoring Universal Agents monitors, which  three IBM Tivoli Workload Scheduler processes can be monitored by  default? ()AreptrBwriterCnetmanDmonmanEbatchmanFappservman

考题 单选题Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()A Update antivirus definitionsB MAC filteringC Effective security policiesD User awareness training

考题 多选题Which three statements are true regarding the data types in Oracle Database 10g/11g?()AOnly one LONG column can be used per tableBA TIMESTAMP data type column stores only time values with fractional secondsCThe BLOB data type column is used to store binary data in an operating system fileDThe minimum column width that can be specified for a VARCHAR2 data type column is oneEThe value for a CHAR data type column is blank-padded to the maximum defined column width

考题 单选题Which statement is true about a Smurf attack?()A It sends ping requests in segments of an invalid sizeB It intercepts the third step in a TCP three-way handshake to hijack a sessionC It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemD It uses Trojan horse applications to create a distributed collection of zombie computers, which can beused to launch a coordinated DDoS attack

考题 多选题Cisco IOS NetFlow gathers data that can be used in which three of these? ()AaccountingBauthenticationCauthorizationDnetwork monitoringEnetwork planning

考题 单选题Which Cisco security software product mitigates Day Zero attacks on desktops and servers - stopping known and unknown attacks without requiring reconfigurations or updates on the endpoints?()A  Cisco Secure Desktop (CSD)B  NAC Appliance Agent (NAA)C  Cisco SecurityAgent (CSA)D  SSLVPN Client (SVC)E  Cisco TrustAgent (CTA)

考题 单选题A UDT is a data type which:()A must contain unique values.B cannot be CAST to other data types.C is created using the CREATE DISTINCT command.D contains a value that was automatically calculated from values in other columns.