DoS
Smurf
Man-in-the-middle
Phishing
第1题:
Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()
第2题:
Which of the following is the BEST way for Karen, a technician, to mitigate phishing attempts?()
第3题:
What are two characteristics of dual-ring interconnect in SDH networks? ()
第4题:
Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?()
第5题:
Which of the following features should an administrator configure to allow an IDS to watch thetraffic on a switch?()
第6题:
Which statement describes exception traffic?()
第7题:
All TCP traffic is marked discard eligible
All UDP traffic is marked discard eligible and a BECN is sent
All TCP traffic is marked discard eligible and a BECN is sent
All traffic exceeding the CIR is marked discard eligible
第8题:
It is a route to be used when the routing protocol fails.
It is a route configured by an ISP that sends traffic into a corporate network.
It is a route used when a packet is destined for a remote network that is not listed in the routing table.
It is a route manually configured for a specific remote network for which a routing protocol is not configured.
It is used to send traffic to a stub network.
第9题:
ARP spoofing
VLAN
Mirroring
Spanning tree
第10题:
Active/passive cluster
Active/active cluster
Log shipping
DNS round robin
第11题:
PPP over Ethernet
Cisco Express forwarding
MPLS traffic Engineering
IS-IS routing
Unicast Reverse Path Forwarding(uRPF)
第12题:
Network layer firewall
Stateful inspection firewall
Zone aware firewall
Application layer firewall
第13题:
A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()
第14题:
Which statement is true about a Smurf attack?()
第15题:
Which of the following IOS features can prevent IP spoofing attacks?()
第16题:
A company is upgrading from DSL to a new T1. When the ISP sends a technician out, the technicianwill terminate the T1 at which of the following locations in the building?()
第17题:
When load balancing traffic between two web servers, which of the following technologies provides the LOWEST cost solution?()
第18题:
Attacker sends multiple DHCP requests flooding DHCP server
Attacker connects rogue server initiating DHCP requests
Attacker connects rogue server replying to DHCP requests
Attacker sends DHCP jam signal causing DHCP server to crash
Attacker sends gratuitous ARP replies, thereby jamming the DHCP server
Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server
第19题:
It sends the traffic through one egress port toward its destination
It sends the traffic through multiple egress ports to all available receivers
It sends the traffic through an internal link to the RE
It sends the traffic to the local system for further processing
第20题:
Exception traffic must be sent to the PFE for processing.
Exception traffic enters one ingress port and is sent out multiple egress ports.
Exception traffic is rate-limited on the internal link to prevent DoS attacks.
Exception traffic is processed after forwarding traffic when congestion exists.
第21题:
Patch panel
Firewall
Switch
Demarc
第22题:
It sends ping requests in segments of an invalid size
It intercepts the third step in a TCP three-way handshake to hijack a session
It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystem
It uses Trojan horse applications to create a distributed collection of zombie computers, which can beused to launch a coordinated DDoS attack
第23题:
Installing antivirus
Reconfiguring the firewall
Changing the permissions and passwords
Educating the end user