DoS
SYN flood
port scanning
IP address sweep
第1题:
TCP/IP的通信过程是?()
第2题:
NBAR supports all of these with the exception of which one?()
第3题:
For which network anomaly does Junos provide a SCREEN?()
第4题:
下面利用TCP的三次握手原理进行的攻击是()。
第5题:
How doTCP SYN attacks take advantage ofTCPto prevent new connections from being established to a host under attack?()
第6题:
Which parameters must you select when configuring operating system probes SCREEN options?()
第7题:
Which parameters are valid SCREEN options for combating operating system probes?()
第8题:
On which destination port in the Layer 4 header does BGP listen?()
第9题:
source NAT with address shifting
pool-based source NAT
static destination NAT
pool-based destination NAT
第10题:
a telnet to port 80
a TCP packet with the SYN and ACK flags set
an SNMP getnext request
an ICMP packet larger than 1024 bytes
第11题:
UDP port 2020
UDP port 1967
TCP port 2020
ICMP port 1967
第12题:
IP address 10.10.10.1 and TCP port 8080
IP address 71.33.252.17 and TCP port 80
IP address 71.33.251.19 and TCP port 80
IP address 71.33.252.19 and TCP port 8080
第13题:
Which of the following descriptions about IP spoofing is correct?()
第14题:
Interface ge-0/0/2.0 of your router is attached to the Internet and is configured with an IP address and network mask of 71.33.252.17/24. A host with IP address 10.20.20.1 is running an HTTP service on TCP port 8080. This host isattached to the ge-0/0/0.0 interface of your router. You must use interface-based static NAT to make the HTTP service on the host reachable from the Internet. On which IP address and TCP port can Internet hosts reach the HTTP service?()
第15题:
Nmap工具不可以执行下列哪种方式扫描()。
第16题:
To initiate testing, which port does a Cisco IOS IP SLA source use to send a control message to an IP SLA responder? ()
第17题:
Which of the following would an attacker use to footprint a system?()
第18题:
Which two types of attacks are considered to be denial of service?() (Choose two.)
第19题:
An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()
第20题:
DoS
SYN flood
port scanning
IP address sweep
第21题:
IP source address is forged
IP destination address is forged
IP TCP source port is forged
IP TCP destination port is forged
None of above
第22题:
These attacks send multiple FIN segments forcing TCP connection release.
These attacks fill up a hosts’ listen queue by failing to ACK partially openedTCPconnections.
These attacks take advantage of the hosts transmit backoff algorithm by sending jam signals to the host.
These attacks increment the ISN of each segment by a random number causing constant TCP retransmissions.
These attacks send TCP RST segments in response toconnection SYN+ACK segments forcing SYN retransmissions.
第23题:
syn-fin, syn-flood, and tcp-no-frag
syn-fin, port-scan, and tcp-no-flag
syn-fin, fin-no-ack, and tcp-no-frag
syn-fin, syn-ack-ack-proxy, and tcp-no-frag
第24题:
syn-fin, syn-flood, and tcp-no-frag
syn-fin, port-scan, and tcp-no-flag
syn-fin, fin-no-ack, and tcp-no-frag
syn-fin, syn-ack-ack-proxy, and tcp-no-frag