参考答案和解析
正确答案: D
解析: 暂无解析
更多“单选题Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?()A DoSB SmurfC Man-in-the-middleD Phishing”相关问题
  • 第1题:

    Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()

    • A、Attacker sends multiple DHCP requests flooding DHCP server
    • B、Attacker connects rogue server initiating DHCP requests
    • C、Attacker connects rogue server replying to DHCP requests
    • D、Attacker sends DHCP jam signal causing DHCP server to crash
    • E、Attacker sends gratuitous ARP replies, thereby jamming the DHCP server
    • F、Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server

    正确答案:A,C

  • 第2题:

    Which of the following is the BEST way for Karen, a technician, to mitigate phishing attempts?()

    • A、Installing antivirus
    • B、Reconfiguring the firewall
    • C、Changing the permissions and passwords
    • D、Educating the end user

    正确答案:D

  • 第3题:

    What are two characteristics of dual-ring interconnect in SDH networks? ()

    • A、 It protects signals against node failures between rings.
    • B、 It protects signals against node failure within a single ring.
    • C、 It allows for traffic to be preempted when a ring switch occurs.
    • D、 Traffic can be dropped and continued at interconnecting nodes.
    • E、 It protects preemptible traffic from being dropped when a ring switch occurs.

    正确答案:A,D

  • 第4题:

    Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?()

    • A、DoS
    • B、Smurf
    • C、Man-in-the-middle
    • D、Phishing

    正确答案:C

  • 第5题:

    Which of the following features should an administrator configure to allow an IDS to watch thetraffic on a switch?()

    • A、ARP spoofing
    • B、VLAN
    • C、Mirroring
    • D、Spanning tree

    正确答案:C

  • 第6题:

    Which statement describes exception traffic?()

    • A、Exception traffic must be sent to the PFE for processing.
    • B、Exception traffic enters one ingress port and is sent out multiple egress ports.
    • C、Exception traffic is rate-limited on the internal link to prevent DoS attacks.
    • D、Exception traffic is processed after forwarding traffic when congestion exists.

    正确答案:C

  • 第7题:

    单选题
    What occurs on a Frame Relay network when the CIR is exceeded?()
    A

    All TCP traffic is marked discard eligible

    B

    All UDP traffic is marked discard eligible and a BECN is sent

    C

    All TCP traffic is marked discard eligible and a BECN is sent

    D

    All traffic exceeding the CIR is marked discard eligible


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    You have just configured a static default route on router TK1. What is the purpose of a default route?()
    A

    It is a route to be used when the routing protocol fails.

    B

    It is a route configured by an ISP that sends traffic into a corporate network.

    C

    It is a route used when a packet is destined for a remote network that is not listed in the routing table.

    D

    It is a route manually configured for a specific remote network for which a routing protocol is not configured.

    E

    It is used to send traffic to a stub network.


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following features should an administrator configure to allow an IDS to watch thetraffic on a switch?()
    A

    ARP spoofing

    B

    VLAN

    C

    Mirroring

    D

    Spanning tree


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    When load balancing traffic between two web servers, which of the following technologies provides the LOWEST cost solution?()
    A

     Active/passive cluster

    B

     Active/active cluster

    C

     Log shipping

    D

     DNS round robin


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following IOS features can prevent IP spoofing attacks?()
    A

    PPP over Ethernet

    B

    Cisco Express forwarding

    C

    MPLS traffic Engineering

    D

    IS-IS routing

    E

    Unicast Reverse Path Forwarding(uRPF)


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()
    A

    Network layer firewall

    B

    Stateful inspection firewall

    C

    Zone aware firewall

    D

    Application layer firewall


    正确答案: A
    解析: 暂无解析

  • 第13题:

    A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?()

    • A、Phishing scam
    • B、Social engineering
    • C、Man-in-the-Middle
    • D、Shoulder surfing

    正确答案:B

  • 第14题:

    Which statement is true about a Smurf attack?()

    • A、It sends ping requests in segments of an invalid size
    • B、It intercepts the third step in a TCP three-way handshake to hijack a session
    • C、It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystem
    • D、It uses Trojan horse applications to create a distributed collection of "zombie" computers, which can beused to launch a coordinated DDoS attack

    正确答案:C

  • 第15题:

    Which of the following IOS features can prevent IP spoofing attacks?()

    • A、PPP over Ethernet
    • B、Cisco Express forwarding
    • C、MPLS traffic Engineering
    • D、IS-IS routing
    • E、Unicast Reverse Path Forwarding(uRPF)

    正确答案:E

  • 第16题:

    A company is upgrading from DSL to a new T1. When the ISP sends a technician out, the technicianwill terminate the T1 at which of the following locations in the building?()

    • A、Patch panel
    • B、Firewall
    • C、Switch
    • D、Demarc

    正确答案:D

  • 第17题:

    When load balancing traffic between two web servers, which of the following technologies provides the LOWEST cost solution?()

    • A、 Active/passive cluster
    • B、 Active/active cluster
    • C、 Log shipping
    • D、 DNS round robin

    正确答案:D

  • 第18题:

    多选题
    Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()
    A

    Attacker sends multiple DHCP requests flooding DHCP server

    B

    Attacker connects rogue server initiating DHCP requests

    C

    Attacker connects rogue server replying to DHCP requests

    D

    Attacker sends DHCP jam signal causing DHCP server to crash

    E

    Attacker sends gratuitous ARP replies, thereby jamming the DHCP server

    F

    Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server


    正确答案: E,C
    解析: 暂无解析

  • 第19题:

    单选题
    How does the PFE handle unicast transit traffic destined for an existing forwarding table entry?()
    A

    It sends the traffic through one egress port toward its destination

    B

    It sends the traffic through multiple egress ports to all available receivers

    C

    It sends the traffic through an internal link to the RE

    D

    It sends the traffic to the local system for further processing


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    Which statement describes exception traffic?()
    A

    Exception traffic must be sent to the PFE for processing.

    B

    Exception traffic enters one ingress port and is sent out multiple egress ports.

    C

    Exception traffic is rate-limited on the internal link to prevent DoS attacks.

    D

    Exception traffic is processed after forwarding traffic when congestion exists.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    A company is upgrading from DSL to a new T1. When the ISP sends a technician out, the technicianwill terminate the T1 at which of the following locations in the building?()
    A

    Patch panel

    B

    Firewall

    C

    Switch

    D

    Demarc


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    Which statement is true about a Smurf attack?()
    A

    It sends ping requests in segments of an invalid size

    B

    It intercepts the third step in a TCP three-way handshake to hijack a session

    C

    It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystem

    D

    It uses Trojan horse applications to create a distributed collection of zombie computers, which can beused to launch a coordinated DDoS attack


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following is the BEST way for Karen, a technician, to mitigate phishing attempts?()
    A

    Installing antivirus

    B

    Reconfiguring the firewall

    C

    Changing the permissions and passwords

    D

    Educating the end user


    正确答案: B
    解析: 暂无解析