网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()
A
It enables an attacker to perform an IP sweep of devices.
B
It enables a hacker to know which operating system the system is running.
C
It can overflow the session table to its limit, which can result in rejection of legitimate traffic.
D
It creates a ping of death and can cause the entire network to be infected with a virus.
参考答案
参考解析
解析:
暂无解析
更多 “单选题A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()A It enables an attacker to perform an IP sweep of devices.B It enables a hacker to know which operating system the system is running.C It can overflow the session table to its limit, which can result in rejection of legitimate traffic.D It creates a ping of death and can cause the entire network to be infected with a virus.” 相关考题
考题
DOS的英文表示是()。
A、Disk、Operating、SystemB、Daily、Operating、SystemC、Disk、Open、SystemD、Date、Open、System
考题
OSI参考模型中的OSI表示的是()。A.Organization Standard InstituteB.Organization Standard Inter connectionC.Open System InternetD.Open System Inter connection
考题
A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()
A. It enables an attacker to perform an IP sweep of devices.B. It enables a hacker to know which operating system the system is running.C. It can overflow the session table to its limit, which can result in rejection of legitimate traffic.D. It creates a ping of death and can cause the entire network to be infected with a virus.
考题
An antivirus program (1) a virus by searching code recognized as that of one of the thousands of viruses known to afflict computer systems. An antivirus Program also can be used to create a checksum for (2) files on your disk, save the checksums in a special file, and then use the checksums to (3) whether files have been modified perhaps by a new virus. Special terminate and stay resident (TSR) programs can check for unusual (4) to access vital disk areas and system f11es, and check files you copy into memory to be sure they are not (5) .A.declaresB.deductsC.defeatsD.detects
考题
Which of the following statements is NOT true?()AThe open field system provided a good opportunity to experiment.BThe open field system wasted land.CThe open field system was wasteful of labor and time.DThe open field system made livestock farming difficult.
考题
Which of the following statements is NOT true?()A、The open field system provided a good opportunity to experiment.B、The open field system wasted land.C、The open field system was wasteful of labor and time.D、The open field system made livestock farming difficult.
考题
An administrator has added a new device to a system and wants to determine if it has been correctly added to the ODM database. Which command would the system administrator use?()A、odmgetB、odmaddC、odmshowD、odmcreate
考题
在网络体系结构中,OSI表示()A、Open System InterconnectionB、Open System InformationC、Operating System InterconnectionD、Operating System Information
考题
OSI参考模型中的OSI表示的是()A、Organization Standard InstituteB、Organization Standard InterconnectionC、Open System InternetD、Open System Interconnection
考题
The df command indicates that a filesystem is full, however, the du command indicates that not all space is allocated. How would the system administrator isolate the discrepancy()A、Use the fuser command to identify deleted but open files.B、Use the ipcs command to view orphan shared memory segments.C、Use the defrag command to determine if the filesystem is fragmented.D、Use the topas command to identify processes using the most system resources.
考题
A system administrator issued the errpt command and had no results. The system administrator determined that error logging was turned off. Which of the following commands should be used to start logging system errors?()A、/usr/bin/errmsgB、/usr/lib/errdemonC、/usr/lib/errloggerD、/usr/bin/errinstall
考题
Which command can a system administrator use to verify that a tape is in backup format and is readable by the system?()A、tarB、tctlC、tcopyD、restore
考题
A system administrator has just finished upgrading a system to AIX 5.2. If there are future problems, the system administrator would like to add an entry to the AIX errorlog to record this event. Which of the following commands can be issued for this purpose?()A、/usr/bin/errmsg "System upgraded to AIX 5.2"B、/usr/bin/errlog "System upgraded to AIX 5.2"C、/usr/bin/errupdate "System upgraded to AIX 5.2"D、/usr/bin/errlogger "System upgraded to AIX 5.2"
考题
How does a system administrator add a new user to a system?()A、mkuserB、cruserC、adduserD、edit /etc/password
考题
A system administrator is attempting to unmount filesystem /dev/data and receives the following message: umount: 0506-349 Cannot unmount /dev/data: The requested resource is busy. Which of the following commands can be used to determine which process has open references within the filesystem?()A、lsfsB、topasC、fuserD、mount
考题
Which of the following outputs will best indicate if a system is CPU bound?()A、 %idle 10% B、 %usr + %sys 80% C、 %sys + %wio 80% D、 %wio + %idle 80%
考题
A system administrator is monitoring a system that has recently shown a decrease in performance.The administrator suspects that the system may be low on memory and may be paging excessively.Which of the following commands is best to identify a possible paging problem?()A、iostatB、netstatC、psD、vmstat
考题
A system administrator is installing a C compiler on a system. According to the compiler’s documenation, the AIX fileset bos.adt.lib must be installed prior to installation of the compiler. Which command would the system administrator use to verify installation of the bos.adt.lib fileset?()A、installpB、instfixC、lsallqD、lslpp
考题
You work as a database administrator at Certkiller .com. In your production database, you observe that users’ transactions are consuming a lot of resource and you plan to impose resource restrictions by using Resource Manager. For which three resources can you enable usage restrictions by using Resource Manager? ()A、 CPU usageB、 degree of parallelismC、 number of open cursorsD、 number of sorts performedE、 idle time for blocking sessionsF、 number of disk I/O operations performedG、 number of memory I/O operations performed
考题
对于IIS日志文件的访问权限,下列哪些设置是正确的?()A、SYSTEM(完全控制)Administrator(完全控制)Users(修改)B、SYSTEM(完全控制)Administrator(完全控制)Everyone(读取和运行)C、SYSTEM(完全控制)Administrator(完全控制)Inernet来宾账户(读取和运行)D、SYSTEM(完全控制)Administrator(完全控制)
考题
单选题Purging air from a hydraulic system is necessary when()A
adding small amounts of oil to the systemB
the system has been overheatedC
the system has been drained and then filled with new oilD
the system has been idle for a long period of time
考题
单选题Which of the following statements is NOT true?()A
The open field system provided a good opportunity to experiment.B
The open field system wasted land.C
The open field system was wasteful of labor and time.D
The open field system made livestock farming difficult.
考题
单选题When it is necessary to open a refrigeration system for repairs and the system will be open for more than a few minutes, the open ends of the system should be ().A
dehydratedB
purgedC
pluggedD
evacuated
考题
单选题You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()A
Control Panel Data Sources (ODBC).B
Control Panel System Tools Shared Folders.C
Computer Management System Tools System Information.D
Computer Management System Tools Shared Folders Open Files.E
Computer Management System Tools Shared Folders Sessions.F
Computer Management System Tools Shared Folders Shares.
考题
单选题A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()A
It enables an attacker to perform an IP sweep of devices.B
It enables a hacker to know which operating system the system is running.C
It can overflow the session table to its limit, which can result in rejection of legitimate traffic.D
It creates a ping of death and can cause the entire network to be infected with a virus.
考题
单选题As an alternative to the conventional seawater cooling system, is based on principles about cooler locations, ()flow control and preheating, but with a central cooler and one additional set of pumps().A
the central cooling system, differentB
the central cooling system, the sameC
the open cooling system, differentD
the open cooling system, the same
考题
单选题Which of the following outputs will best indicate if a system is CPU bound?()A
%idle 10% B
%usr + %sys 80% C
%sys + %wio 80% D
%wio + %idle 80%
考题
单选题A system administrator has filesystems that should not be mounted during system startup. How can the system administrator prevent the /data filesystem from being mounted during subsequent boots?()A
mount -no /dataB
chfs -A no /dataC
mount -t nfs /dataD
chfs -a type=nfs /data
热门标签
最新试卷