Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?()
第1题:
A. It protects signals against node failures between rings.
B. It protects signals against node failure within a single ring.
C. It allows for traffic to be preempted when a ring switch occurs.
D. Traffic can be dropped and continued at interconnecting nodes.
E. It protects preemptible traffic from being dropped when a ring switch occurs.
第2题:
Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()
第3题:
A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()
第4题:
Which of the following is the BEST way for Karen, a technician, to mitigate phishing attempts?()
第5题:
What are two characteristics of dual-ring interconnect in SDH networks? ()
第6题:
The Company security administrator is concerned with layer 2 network attacks. Which two statements about these attacks are true? ()
第7题:
Which of the following features should an administrator configure to allow an IDS to watch thetraffic on a switch?()
第8题:
Which statement describes exception traffic?()
第9题:
An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()
第10题:
It is a route to be used when the routing protocol fails.
It is a route configured by an ISP that sends traffic into a corporate network.
It is a route used when a packet is destined for a remote network that is not listed in the routing table.
It is a route manually configured for a specific remote network for which a routing protocol is not configured.
It is used to send traffic to a stub network.
第11题:
Active/passive cluster
Active/active cluster
Log shipping
DNS round robin
第12题:
It protects signals against node failures between rings.
It protects signals against node failure within a single ring.
It allows for traffic to be preempted when a ring switch occurs.
Traffic can be dropped and continued at interconnecting nodes.
It protects preemptible traffic from being dropped when a ring switch occurs.
第13题:
A. It is a route to be used when the routing protocol fails.
B. It is a route configured by an ISP that sends traffic into a corporate network.
C. It is a route used when a packet is destined for a remote network that is not listed in the routing table.
D. It is a route manually configured for a specific remote network for which a routing protocol is not configured.
E. It is used to send traffic to a stub network.
第14题:
What occurs on a Frame Relay network when the CIR is exceeded?()
第15题:
How does the PFE handle unicast transit traffic destined for an existing forwarding table entry?()
第16题:
Which statement is true about a Smurf attack?()
第17题:
Which of the following IOS features can prevent IP spoofing attacks?()
第18题:
A company is upgrading from DSL to a new T1. When the ISP sends a technician out, the technicianwill terminate the T1 at which of the following locations in the building?()
第19题:
When load balancing traffic between two web servers, which of the following technologies provides the LOWEST cost solution?()
第20题:
Which process occurs first during the Ethernet Discovery Stage process for a PPPoE service offering?()
第21题:
Attacker sends multiple DHCP requests flooding DHCP server
Attacker connects rogue server initiating DHCP requests
Attacker connects rogue server replying to DHCP requests
Attacker sends DHCP jam signal causing DHCP server to crash
Attacker sends gratuitous ARP replies, thereby jamming the DHCP server
Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server
第22题:
DoS
Smurf
Man-in-the-middle
Phishing
第23题:
It sends ping requests in segments of an invalid size
It intercepts the third step in a TCP three-way handshake to hijack a session
It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystem
It uses Trojan horse applications to create a distributed collection of zombie computers, which can beused to launch a coordinated DDoS attack