更多“Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?()A、DoSB、SmurfC、Man-in-the-middleD、Phishing”相关问题
  • 第1题:

    What are two characteristics of dual-ring interconnect in SONET networks? ()(Choose two.)

    A. It protects signals against node failures between rings.

    B. It protects signals against node failure within a single ring.

    C. It allows for traffic to be preempted when a ring switch occurs.

    D. Traffic can be dropped and continued at interconnecting nodes.

    E. It protects preemptible traffic from being dropped when a ring switch occurs.


    参考答案:A, D

  • 第2题:

    Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()

    • A、Attacker sends multiple DHCP requests flooding DHCP server
    • B、Attacker connects rogue server initiating DHCP requests
    • C、Attacker connects rogue server replying to DHCP requests
    • D、Attacker sends DHCP jam signal causing DHCP server to crash
    • E、Attacker sends gratuitous ARP replies, thereby jamming the DHCP server
    • F、Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server

    正确答案:A,C

  • 第3题:

    A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()

    • A、Phishing scam
    • B、Social engineering
    • C、Man-in-the-Middle
    • D、Shoulder surfing

    正确答案:B

  • 第4题:

    Which of the following is the BEST way for Karen, a technician, to mitigate phishing attempts?()

    • A、Installing antivirus
    • B、Reconfiguring the firewall
    • C、Changing the permissions and passwords
    • D、Educating the end user

    正确答案:D

  • 第5题:

    What are two characteristics of dual-ring interconnect in SDH networks? ()

    • A、 It protects signals against node failures between rings.
    • B、 It protects signals against node failure within a single ring.
    • C、 It allows for traffic to be preempted when a ring switch occurs.
    • D、 Traffic can be dropped and continued at interconnecting nodes.
    • E、 It protects preemptible traffic from being dropped when a ring switch occurs.

    正确答案:A,D

  • 第6题:

    The Company security administrator is concerned with layer 2 network attacks.  Which two  statements about these attacks are true? ()

    • A、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a  false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.
    • B、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  message with a forged identity to a transmitting host.
    • C、 MAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.
    • D、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  packet that contains the forged address of the next hop router.
    • E、 MAC address flooding is an attempt to redirect traffic to a single port by associating that port  with all MAC addresses in the VLAN.

    正确答案:B,C

  • 第7题:

    Which of the following features should an administrator configure to allow an IDS to watch thetraffic on a switch?()

    • A、ARP spoofing
    • B、VLAN
    • C、Mirroring
    • D、Spanning tree

    正确答案:C

  • 第8题:

    Which statement describes exception traffic?()

    • A、Exception traffic must be sent to the PFE for processing.
    • B、Exception traffic enters one ingress port and is sent out multiple egress ports.
    • C、Exception traffic is rate-limited on the internal link to prevent DoS attacks.
    • D、Exception traffic is processed after forwarding traffic when congestion exists.

    正确答案:C

  • 第9题:

    An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()

    • A、DoS
    • B、SYN flood
    • C、port scanning
    • D、IP address sweep

    正确答案:C

  • 第10题:

    单选题
    You have just configured a static default route on router TK1. What is the purpose of a default route?()
    A

    It is a route to be used when the routing protocol fails.

    B

    It is a route configured by an ISP that sends traffic into a corporate network.

    C

    It is a route used when a packet is destined for a remote network that is not listed in the routing table.

    D

    It is a route manually configured for a specific remote network for which a routing protocol is not configured.

    E

    It is used to send traffic to a stub network.


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    When load balancing traffic between two web servers, which of the following technologies provides the LOWEST cost solution?()
    A

     Active/passive cluster

    B

     Active/active cluster

    C

     Log shipping

    D

     DNS round robin


    正确答案: B
    解析: 暂无解析

  • 第12题:

    多选题
    What are two characteristics of dual-ring interconnect in SDH networks? ()
    A

    It protects signals against node failures between rings.

    B

    It protects signals against node failure within a single ring.

    C

    It allows for traffic to be preempted when a ring switch occurs.

    D

    Traffic can be dropped and continued at interconnecting nodes.

    E

    It protects preemptible traffic from being dropped when a ring switch occurs.


    正确答案: D,B
    解析: 暂无解析

  • 第13题:

    You have just configured a static default route on router TK1. What is the purpose of a default route?()

    A. It is a route to be used when the routing protocol fails.

    B. It is a route configured by an ISP that sends traffic into a corporate network.

    C. It is a route used when a packet is destined for a remote network that is not listed in the routing table.

    D. It is a route manually configured for a specific remote network for which a routing protocol is not configured.

    E. It is used to send traffic to a stub network.


    参考答案:C

  • 第14题:

    What occurs on a Frame Relay network when the CIR is exceeded?()

    • A、All TCP traffic is marked discard eligible
    • B、All UDP traffic is marked discard eligible and a BECN is sent
    • C、All TCP traffic is marked discard eligible and a BECN is sent
    • D、All traffic exceeding the CIR is marked discard eligible

    正确答案:D

  • 第15题:

    How does the PFE handle unicast transit traffic destined for an existing forwarding table entry?()

    • A、It sends the traffic through one egress port toward its destination
    • B、It sends the traffic through multiple egress ports to all available receivers
    • C、It sends the traffic through an internal link to the RE
    • D、It sends the traffic to the local system for further processing

    正确答案:A

  • 第16题:

    Which statement is true about a Smurf attack?()

    • A、It sends ping requests in segments of an invalid size
    • B、It intercepts the third step in a TCP three-way handshake to hijack a session
    • C、It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystem
    • D、It uses Trojan horse applications to create a distributed collection of "zombie" computers, which can beused to launch a coordinated DDoS attack

    正确答案:C

  • 第17题:

    Which of the following IOS features can prevent IP spoofing attacks?()

    • A、PPP over Ethernet
    • B、Cisco Express forwarding
    • C、MPLS traffic Engineering
    • D、IS-IS routing
    • E、Unicast Reverse Path Forwarding(uRPF)

    正确答案:E

  • 第18题:

    A company is upgrading from DSL to a new T1. When the ISP sends a technician out, the technicianwill terminate the T1 at which of the following locations in the building?()

    • A、Patch panel
    • B、Firewall
    • C、Switch
    • D、Demarc

    正确答案:D

  • 第19题:

    When load balancing traffic between two web servers, which of the following technologies provides the LOWEST cost solution?()

    • A、 Active/passive cluster
    • B、 Active/active cluster
    • C、 Log shipping
    • D、 DNS round robin

    正确答案:D

  • 第20题:

    Which process occurs first during the Ethernet Discovery Stage process for a PPPoE service offering?()

    • A、The ERX router sends an Active Discovery Offer message.
    • B、The ERX router sends an Active Discovery Initiation message.
    • C、The customer device sends an Active Discovery Offer message.
    • D、The customer device sends an Active Discovery Initiation message

    正确答案:D

  • 第21题:

    多选题
    Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()
    A

    Attacker sends multiple DHCP requests flooding DHCP server

    B

    Attacker connects rogue server initiating DHCP requests

    C

    Attacker connects rogue server replying to DHCP requests

    D

    Attacker sends DHCP jam signal causing DHCP server to crash

    E

    Attacker sends gratuitous ARP replies, thereby jamming the DHCP server

    F

    Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server


    正确答案: E,C
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?()
    A

    DoS

    B

    Smurf

    C

    Man-in-the-middle

    D

    Phishing


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Which statement is true about a Smurf attack?()
    A

    It sends ping requests in segments of an invalid size

    B

    It intercepts the third step in a TCP three-way handshake to hijack a session

    C

    It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystem

    D

    It uses Trojan horse applications to create a distributed collection of zombie computers, which can beused to launch a coordinated DDoS attack


    正确答案: D
    解析: 暂无解析