多选题Which two network attack statements are true?()AAccess attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.BAccess attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP d

题目
多选题
Which two network attack statements are true?()
A

Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.

B

Access attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.

C

DoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.

D

DoS attacks can consist of IP spoofing and DDoS attacks.

E

IP spoofing can be reduced through the use of policy-based routing.

F

IP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.


相似考题
参考答案和解析
正确答案: C,D
解析: 暂无解析
更多“Which two network attack statements are true?()”相关问题
  • 第1题:

    Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4? (Choose two.)()

    • A、It establishes a static route to the 172.16.3.0 network.
    • B、It establishes a static route to the 192.168.2.0 network.
    • C、It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network.
    • D、It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4.
    • E、It uses the default administrative distance.
    • F、It is a route that would be used last if other routes to the same destination exist.

    正确答案:A,E

  • 第2题:

    Which two statements are true about optical networks?()

    • A、SONET and SDH both use time-division multiplexing.
    • B、An optical transport network system uses time-division multiplexing.
    • C、SONET and SDH both use wavelength-division multiplexing.
    • D、An optical transport network system uses wavelength-division multiplexing.

    正确答案:A,D

  • 第3题:

    Which two statements describe the functions and operations of IDS and IPS systems?()

    • A、A network administrator entering a wrong password would generate a true-negative alarm.
    • B、A false positive alarm is generated when an IDS/IPS signature is correctly identified.
    • C、An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.
    • D、Cisco IDS works inline and stops attacks before they enter the network.
    • E、Cisco IPS taps the network traffic and responds after an attack.
    • F、Profile-based intrusion detection is also known as "anomaly detection".

    正确答案:B,F

  • 第4题:

    An etwork administrator has enabled OSPF across an NBMA network and has issued the command ip ospf network nonbroadcast. Given those facts, which two statements are true?()

    • A、Interfaces will automatically detect and build adjacencies with neighbor routers
    • B、DR and BDR elections will not occur
    • C、DR and BDR elections will occur
    • D、The neighbor command is required to build adjacencies
    • E、All routers must be configured in a fully meshed topology with all other routers

    正确答案:C,D

  • 第5题:

    Which two statements are true about the implementation of QoS? ()

    • A、 Implementing DiffServ involves the configuration of RSVP.
    • B、 Implementing IntServ allows QoS to be performed by configuring only the ingress and egress devices.
    • C、 Implementing IntServ involves the utilization of RSVP.
    • D、 Traffic should be classified and marked by the core network devices.
    • E、 Traffic should be classified and marked as close to the edge of the network as possible.

    正确答案:C,E

  • 第6题:

    Which two statements are true of a network mask?()

    • A、A subnet mask specifies the portion of an IP address that is in a binary format.
    • B、A subnet mask specifies the portion of an IP address that is in a decimal format.
    • C、A subnet mask specifies the portion of an IP address that represents a network prefix.
    • D、A subnet mask specifies the portion of an IP address that represents network hosts.

    正确答案:C,D

  • 第7题:

    Which two statements are true regarding L2TP? ()(Choose two.)

    • A、Tunnels are initiated by the LAC
    • B、Tunnels are initiated by the LNS
    • C、By default, subscriber authentication occurs on the LNS
    • D、By default, subscriber authentication occurs on the LAC

    正确答案:A,C

  • 第8题:

    多选题
    Which two of these statements best describe the benefits of WPAv2? (Choose two.)()
    A

    SSID broadcast prevention

    B

    man-in-the-middle attack protection

    C

    cost reduction through software upgrades in all existing hardware

    D

    dynamic key generation

    E

    RF jamming prevention


    正确答案: D,C
    解析: 暂无解析

  • 第9题:

    多选题
    Which two statements are true regarding rescue configurations?()
    A

    Once saved, a rescue configuration is loaded using the rollback 0 command.

    B

    The rescue configuration must contain the minimal elements necessary to restore network connectivity.

    C

    A minimal rescue configuration is defined by default.

    D

    A rescue configuration must include a root password.


    正确答案: B,D
    解析: 暂无解析

  • 第10题:

    单选题
    Which two statements are true of a network mask?()
    A

    A subnet mask specifies the portion of an IP address that is in a binary format

    B

    A subnet mask specifies the portion of an IP address that is in a decimal format

    C

    A subnet mask specifies the portion of an IP address that represents a network prefix

    D

    A subnet mask specifies the portion of an IP address that represetns network hosts


    正确答案: D
    解析: 暂无解析

  • 第11题:

    多选题
    Which three statements are true regarding IDP?()
    A

    IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.

    B

    IDP inspects traffic up to the Application layer.

    C

    IDP searches the data stream for specific attack patterns.

    D

    IDP inspects traffic up to the Presentation layer.

    E

    IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.


    正确答案: A,B
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements are true of a network mask?()
    A

    A subnet mask specifies the portion of an IP address that is in a binary format.

    B

    A subnet mask specifies the portion of an IP address that is in a decimal format.

    C

    A subnet mask specifies the portion of an IP address that represents a network prefix.

    D

    A subnet mask specifies the portion of an IP address that represents network hosts.


    正确答案: C,D
    解析: 暂无解析

  • 第13题:

    Which two statements are true about L2TP tunnels?() (Choose two.)

    • A、Traffic is clear text
    • B、Traffic is encrypted 
    • C、They are initiated by the LNS
    • D、They are initiated by the LAC

    正确答案:A,D

  • 第14题:

    Which two statements are true about the application of QoS in a converged network?()

    • A、end-to-end network delay times that exceed 50 ms for real-time traffic are considered unacceptable
    • B、end-to-end network delay times that exceed 250 ms for real-time traffic are considered unacceptable
    • C、end-to-end network delay is not a factor as long as the  delay is consistent
    • D、some packet loss can be corrected by codec algorithms
    • E、RSVP handles voice packet retransmission
    • F、fragmentation is a result of packet loss

    正确答案:B,D

  • 第15题:

    Which two statements are true about network voice traffic? (Choose two.)()

    • A、 Voice traffic is affected more by link speed than FTP traffic is.
    • B、 Voice traffic is affected more by packet delays than FTP traffic is.
    • C、 Voice streams involve larger packet sizes than most TCP network traffic involves.
    • D、 Voice traffic is more sensitive to packet loss than TCP network traffic is.
    • E、 Voice traffic requires QOS mechanisms only in heavily loaded network segments.

    正确答案:B,D

  • 第16题:

    Which two statements about the use of VLANs to segment a network are true? ()

    • A、VLANs increase the size of collision domains.
    • B、VLANs allow logical grouping of users by function.
    • C、VLANs simplify switch administration.
    • D、VLANs enhance network security.

    正确答案:B,D

  • 第17题:

    Which of the following statements are true?() 

    • A、 The equals() method determines if reference values refer to the same object.
    • B、 The == operator determines if the contents and type of two separate objects match.
    • C、 The equals() method returns true only when the contents of two objects match.
    • D、 The class File overrides equals() to return true if the contents and type of two separate objects        match.

    正确答案:A,D

  • 第18题:

    Which two statements are true of a network mask?()

    • A、A subnet mask specifies the portion of an IP address that is in a binary format
    • B、A subnet mask specifies the portion of an IP address that is in a decimal format
    • C、A subnet mask specifies the portion of an IP address that represents a network prefix
    • D、A subnet mask specifies the portion of an IP address that represetns network hosts

    正确答案:C

  • 第19题:

    多选题
    Which two statements are true about L2TP tunnels?() (Choose two.)
    A

    Traffic is clear text

    B

    Traffic is encrypted 

    C

    They are initiated by the LNS

    D

    They are initiated by the LAC


    正确答案: B,D
    解析: 暂无解析

  • 第20题:

    多选题
    Which two statements are true about the application of QoS in a converged network?()
    A

    end-to-end network delay times that exceed 50 ms for real-time traffic are considered unacceptable

    B

    end-to-end network delay times that exceed 250 ms for real-time traffic are considered unacceptable

    C

    end-to-end network delay is not a factor as long as the  delay is consistent

    D

    some packet loss can be corrected by codec algorithms

    E

    RSVP handles voice packet retransmission

    F

    fragmentation is a result of packet loss


    正确答案: D,C
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements are true regarding L2TP? ()(Choose two.)
    A

    Tunnels are initiated by the LAC

    B

    Tunnels are initiated by the LNS

    C

    By default, subscriber authentication occurs on the LNS

    D

    By default, subscriber authentication occurs on the LAC


    正确答案: C,D
    解析: 暂无解析

  • 第22题:

    多选题
    Which of the following statements are true?()
    A

    The equals() method determines if reference values refer to the same object.

    B

    The == operator determines if the contents and type of two separate objects match.

    C

    The equals() method returns true only when the contents of two objects match.

    D

    The class File overrides equals() to return true if the contents and type of two separate objects        match.


    正确答案: C,D
    解析: 严格来说这个问题的答案是不确定的,因为equals()方法是可以被重载的,但是按照java语言的本意来说:如果没有重写(override)新类的equals(),则该方法和 == 操作符一样在两个变量指向同一对象时返回真,但是java推荐的是使用equals()方法来判断两个对象的内容是否一样,就像String类的equals()方法所做的那样:判定两个String对象的内容是否相同,而==操作符返回true的唯一条件是两个变量指向同一对象。从这个意义上来说选择给定的答案。从更严格的意义来说正确答案应该只有D。

  • 第23题:

    多选题
    Which two statements about NTP version 4 are true?()
    A

    It supports fast synchronization at starting and before network failures

    B

    It supports automatic server discovery

    C

    It uses a fixed-point arithmetion

    D

    It supports the nanokernel kernel implementation

    E

    It does not support Public-Key Cryptography


    正确答案: D,B
    解析: 暂无解析

  • 第24题:

    多选题
    Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4? (Choose two.)()
    A

    It establishes a static route to the 172.16.3.0 network.

    B

    It establishes a static route to the 192.168.2.0 network.

    C

    It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network.

    D

    It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4.

    E

    It uses the default administrative distance.

    F

    It is a route that would be used last if other routes to the same destination exist.


    正确答案: E,B
    解析: 暂无解析