Which statement is true about a worm attack?()A、Human interaction is required to facilitate the spread.B、The worm executes arbitrary code and installs copies of itself in the memory of the infected computer.C、Extremely large volumes of requests are sent o

题目

Which statement is true about a worm attack?()

  • A、Human interaction is required to facilitate the spread.
  • B、The worm executes arbitrary code and installs copies of itself in the memory of the infected computer.
  • C、Extremely large volumes of requests are sent over a network or over the Internet.
  • D、Data or commands are injected into an existing stream of data. That stream is passed between a client and server application.

相似考题
更多“Which statement is true about a worm attack?()A、Human interaction is required to facilitate the spread.B、The worm executes arbitrary code and installs copies of itself in the memory of the infected computer.C、Extremely large volumes of requests are sent o”相关问题
  • 第1题:

    Which statement is true about TCN propagation?()

    • A、The originator of the TCN immediately floods this information through the network.
    • B、The TCN propagation is a two step process.
    • C、A TCN is generated and sent to the root bridge.
    • D、The root bridge must flood this information throughout the network.

    正确答案:C

  • 第2题:

    A WORM drive can be equated to which of the following common technologies?()

    • A、 CDRW
    • B、 CDR
    • C、 Flash Media
    • D、 DVDRW

    正确答案:B

  • 第3题:

    Which of the following is a sign that a computer has been infected by a worm?()

    • A、Screensaver changed on its own
    • B、Unauthorized outgoing emails being sent
    • C、Desktop background changed on its own
    • D、Left and right mouse buttons have been flipped

    正确答案:B

  • 第4题:

    A batch application executes a large number of update statements. The service level agreement for the application states that the application must complete its work as quickly as possible to ensure that dependent workloads can start ontime. What is one way to help the application complete quickly?()

    • A、Code the application to issue a LOCK TABLE statement.  
    • B、Code the application to issue a LOCK ROW statement.  
    • C、Decrease the number of I/O servers.  
    • D、Increase the locklist parameter. 

    正确答案:A

  • 第5题:

    Which statement is true about the Manageability Monitor (MMON) background proces()

    • A、It transfers statistics from memory to disk at regular intervals.
    • B、It coordinates the rebalance activity for disk groups when ASM is used.
    • C、It communicates with the Automatic Storage Management (ASM) instance on behalf of the databaseinstance.
    • D、It performs dynamic memory management when Automatic Shared Memory Management is enabledfor the database instance.

    正确答案:A

  • 第6题:

    Evaluate the SQL statement:TRUNCATE TABLE DEPT;Which three are true about the SQL statement? ()

    • A、It releases the storage space used by the table.
    • B、It does not release the storage space used by the table.
    • C、You can roll back the deletion of rows after the statement executes.
    • D、You can NOT roll back the deletion of rows after the statement executes.
    • E、An attempt to use DESCRIBE on the DEPT table after the TRUNCATE statement executes will display an error.
    • F、You must be the owner of the table or have DELETE ANY TABLE system privileges to truncate the DEPT table

    正确答案:A,D,F

  • 第7题:

    Which two statements are true about setting the per-thread buffers higher than required?()

    • A、More memory per thread is beneficial in all scenarios
    • B、It causes increased overhead due to initial memory allocation
    • C、It can affect system stability during peak load times, due to swapping
    • D、It requires increasing the thread_cache_size variable

    正确答案:B,C

  • 第8题:

    Which statement is true about "sticky" load balancing for Clusters? ()

    • A、The "clientip" setting does not apply to clusters, it only pertains to a Forwarder.
    • B、When set to "clientip" it uses the client's IP address to bind the client to a particular target server.
    • C、When set to "clientip" it allows a DX sticky cookie to be sent to and stored by the client based on the IP address.
    • D、When set to "clientip" it ensures that all subsequent requests are directed to the same client that made the initial request.

    正确答案:B

  • 第9题:

    多选题
    Given the following code fragment:     public void create() {     Vector myVect;     myVect = new Vector();      }  Which of the following statements are true?()
    A

    The declaration on line 2 does not allocate memory space for the variable myVect.

    B

    The declaration on line 2 allocates memory space for a reference to a Vector object.

    C

    The statement on line 2 creates an object of class Vector.

    D

    The statement on line 3 creates an object of class Vector.

    E

    The statement on line 3 allocates memory space for an object of class Vector.


    正确答案: C,D
    解析: SL-275中指出:要为一个新对象分配空间必须执行new Xxx()调用,new调用执行以下的操作: 
    1.为新对象分配空间并将其成员初始化为0或者null。 
    2.执行类体中的初始化。(例如在类中有一个成员声明int a=10;在第一步后a=0 ,执行到第二步后a=10)    
    3.执行构造函数。 
    4.变量被分配为一个到内存堆中的新对象的引用。

  • 第10题:

    多选题
    What are two steps that must be taken when mitigating a worm attack?()
    A

    Inoculate systems by applying update patches.

    B

    Limit traffic rate.

    C

    Apply authentication.

    D

    Quarantine infected machines.

    E

    Enable anti-spoof measures.


    正确答案: D,A
    解析: 暂无解析

  • 第11题:

    单选题
    Which statement is true about a Smurf attack?()
    A

    It sends ping requests in segments of an invalid size

    B

    It intercepts the third step in a TCP three-way handshake to hijack a session

    C

    It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystem

    D

    It uses Trojan horse applications to create a distributed collection of zombie computers, which can beused to launch a coordinated DDoS attack


    正确答案: D
    解析: 暂无解析

  • 第12题:

    多选题
    Which three are true about the large pool for an Oracle database instance that supports shared serverconnections?()
    A

    Allocates memory for RMAN backup and restore operations

    B

    Allocates memory for shared and private SQL areas

    C

    Contains a cursor area for storing runtime information about cursors

    D

    Contains stack space

    E

    Contains a hash area performing hash joins of tables


    正确答案: E,C
    解析: 暂无解析

  • 第13题:

    What are two steps that must be taken when mitigating a worm attack?()

    • A、Inoculate systems by applying update patches. 
    • B、Limit traffic rate. 
    • C、Apply authentication. 
    • D、Quarantine infected machines. 
    • E、Enable anti-spoof measures.

    正确答案:A,D

  • 第14题:

    Which statement is true about a Smurf attack?()

    • A、It sends ping requests in segments of an invalid size
    • B、It intercepts the third step in a TCP three-way handshake to hijack a session
    • C、It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystem
    • D、It uses Trojan horse applications to create a distributed collection of "zombie" computers, which can beused to launch a coordinated DDoS attack

    正确答案:C

  • 第15题:

    Which of the following does an out-of-memory error indicate on a printer?()

    • A、A faulty memory module in the printer.
    • B、A postscript print job has been sent to the printer.
    • C、A large print job has been sent to the printer.
    • D、The printer firmware needs to be updated.

    正确答案:C

  • 第16题:

    Given the following code fragment:     public void create() {     Vector myVect;     myVect = new Vector();      }  Which of the following statements are true?() 

    • A、 The declaration on line 2 does not allocate memory space for the variable myVect.
    • B、 The declaration on line 2 allocates memory space for a reference to a Vector object.
    • C、 The statement on line 2 creates an object of class Vector.
    • D、 The statement on line 3 creates an object of class Vector.
    • E、 The statement on line 3 allocates memory space for an object of class Vector.

    正确答案:A,D,E

  • 第17题:

    Which two statements are true about Oracle ActiveCache ?()

    • A、 it supports very large data-sets such as the result-sets from large search queries to be held in memory
    • B、 it provides a set of management tools that enables automation of configuration
    • C、 it provides enhanced visibility across the entire application infrastructure
    • D、 it significantly increases the performance of Web-based applications with no code change

    正确答案:A,D

  • 第18题:

    Which three are true about the large pool for an Oracle database instance that supports shared serverconnections?()

    • A、Allocates memory for RMAN backup and restore operations
    • B、Allocates memory for shared and private SQL areas
    • C、Contains a cursor area for storing runtime information about cursors
    • D、Contains stack space
    • E、Contains a hash area performing hash joins of tables

    正确答案:A,B,C

  • 第19题:

    You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()

    • A、Configure a WMI event trigger.
    • B、Configure a Network Monitor capture filter.
    • C、Configure a Network Monitor trigger.
    • D、Configure a System Monitor alert.

    正确答案:C

  • 第20题:

    单选题
    According to the passage, which of the following statements is true?
    A

    In India, the infection rate almost reaches 12 percent of its population.

    B

    In China, about 50,000 people are infected with HIV.

    C

    AIDS epidemic had caused 15,000,000 deaths in the whole world by January 2,000.

    D

    In the United States, HIV infection will go on to attack about 5% of the whole population.


    正确答案: C
    解析:
    第二段第一句作者提到,到2000年1月艾滋病的流行已经使1500万人死亡,4000万人感染,艾滋病病毒正在缓慢地且无情地破坏着这些人的免疫系统。

  • 第21题:

    多选题
    Which two statements are true about setting the per-thread buffers higher than required?()
    A

    More memory per thread is beneficial in all scenarios

    B

    It causes increased overhead due to initial memory allocation

    C

    It can affect system stability during peak load times, due to swapping

    D

    It requires increasing the thread_cache_size variable


    正确答案: B,D
    解析: 暂无解析

  • 第22题:

    单选题
    Which statement is true about a worm attack?()
    A

    Human interaction is required to facilitate the spread.

    B

    The worm executes arbitrary code and installs copies of itself in the memory of the infected computer.

    C

    Extremely large volumes of requests are sent over a network or over the Internet.

    D

    Data or commands are injected into an existing stream of data. That stream is passed between a client and server application.


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following statements is NOT true about mass communication?
    A

    It can reach no further than human voice.

    B

    It can reach a large audience.

    C

    It is rapid and efficient.

    D

    It can be trusted.


    正确答案: B
    解析:
    最后一段指出思想传播的速度、距离和受众都发生了变化,大约200年前,人们所说的话并不能比其声音传播的更远,而非指的是mass communication(大众传媒)。