Which method is of gaining access to a system that bypasses normal security measures?()A、Starting a Smurf attackB、Conducting social engineeringC、Creating a back doorD、Launching a DoS attack

题目

Which method is of gaining access to a system that bypasses normal security measures?()

  • A、Starting a Smurf attack
  • B、Conducting social engineering
  • C、Creating a back door
  • D、Launching a DoS attack

相似考题

3.In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization (授权). An access control mechanism (71) between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is (72) to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(73)access. An auditing function monitors and keeps a record of user accesses to system resources. In practice, a number of(74)may cooperatively share the access control function. All operating systems have at least a rudimentary(基本的), and in many cases a quite robust, access control component. Add-on security packages can add to the(75)access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services.A.open B.monitor C.grant D.seek

更多“Which method is of gaining access to a system that bypasses normal security measures?()A、Starting a Smurf attackB、Conducting social engineeringC、Creating a back doorD、Launching a DoS attack”相关问题
  • 第1题:

    After creating backups of critical system and user data, which of the following is the BEST location to store the backups?()

    • A、In the supply closet so anyone can access them if needed
    • B、Near the server for easy access to restore files
    • C、Locked in a cabinet in the IT Manager’s office
    • D、At a secure off-site storage facility

    正确答案:D

  • 第2题:

    A service provider wants to prevent the repeat of a denial of service (DoS) attack that recently disabled Internet access for several thousand customers. Which Cisco solution best matches this business need?()

    • A、Network security
    • B、Virtual Private Network (VPN)
    • C、Wireless network
    • D、Content networking

    正确答案:A

  • 第3题:

    Which of the following security features are enabled by default after creating an instance?()

    • A、Password Invalidation
    • B、Login Timeout
    • C、Cross Site Scripting Protection
    • D、Access Logging

    正确答案:A

  • 第4题:

    What are three security problems with Wi-Fi Protected Access (WPA)?()

    • A、WPA is based on the outdated IEEE 802.11i standard.
    • B、WPA uses RSN,which uses the same base encryption algorithm as RC4.
    • C、WPA requires a hardware upgrade that may not be supported by all vendors.
    • D、WPA uses TKIP,which uses the same base encryption algorithm as WEP.
    • E、WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.
    • F、WPA is susceptible to a security weakness when preshared keys are used.

    正确答案:D,E,F

  • 第5题:

    Observe the following options carefully, which two attacks focus on RSA? ()

    • A、BPA attack
    • B、Adaptive chosen ciphertext attack
    • C、DDoS attack
    • D、Man-in-the-middle attack

    正确答案:A,B

  • 第6题:

    Which of the following helps protect important confidential information from being publiclydisclosed?()

    • A、Hard drive wiping
    • B、Social Engineering
    • C、Classification
    • D、RAS server

    正确答案:C

  • 第7题:

    A user reports that their system is starting to run slower, especially when opening large local files. The system has sufficient RAM for the users applications, but the hard drive seems to have higher than normal activity when opening large files. Which of the following would be the BEST tool to diagnose and troubleshoot this problem? ()

    • A、Task Manager
    • B、NTBACKUP
    • C、FDISK
    • D、Disk Defragmenter

    正确答案:D

  • 第8题:

    Which of the following are examples of physical security measures?()

    • A、Policies and procedures
    • B、Encryption
    • C、Locked doors
    • D、Security personnel
    • E、Backup tapes

    正确答案:C,D

  • 第9题:

    单选题
    A diesel engine is turned at normal cranking speed, but fails to fireThis can occur from ()
    A

    low lube oil temperature

    B

    low starting air temperature

    C

    air in the fuel injection

    D

    water in the starting air system


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    Which method is of gaining access to a system that bypasses normal security measures?()
    A

    Starting a Smurf attack

    B

    Conducting social engineering

    C

    Creating a back door

    D

    Launching a DoS attack


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    A diesel engine is turned at normal cranking speed and no ignition occursThis could be the result of ()
    A

    low lube oil temperature

    B

    low starting air temperature

    C

    air bubbles in the fuel oil system

    D

    water in the starting air system


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    Explosions do occur () caused by the ignition of oil or vapour gaining access from compressors or defective engine starting valves.
    A

    in boiler drums

    B

    in refrigerating plants

    C

    in starting air pipes

    D

    in air coolers


    正确答案: C
    解析: 暂无解析

  • 第13题:

    Choose the service component in the optimize phase which assesses the wlan system and drives continuous improvements by recommending remediation measures including device configuration optimization, capacity planning, traffic analysis, security assessment, ()and quality issue resolution.

    • A、technology assessment
    • B、operations assessment
    • C、security assessment
    • D、security administration
    • E、change management

    正确答案:A

  • 第14题:

    A service provider wants to prevent the repeat of a denial of service (DoS) attack that recently disabled Internet access for several thousand customers. Which Cisco solution best matches this business need?()

    • A、Network security
    • B、Wireless network
    • C、Content networking
    • D、Virtual Private Network (VPN)

    正确答案:A

  • 第15题:

    What are four methods used by hackers? ()

    • A、footprint analysis attack
    • B、privilege escalation attack
    • C、buffer Unicode attack
    • D、social engineering attack
    • E、front door attacks
    • F、Trojan horse attack

    正确答案:A,B,D,F

  • 第16题:

    Which feature would prevent guest users from gaining network access by unplugging an IP phone and connecting a laptop computer?()

    • A、IPSec VPN
    • B、SSL VPN
    • C、port security
    • D、port security with statically configured MAC addresses
    • E、private VLANs

    正确答案:D

  • 第17题:

    Which of the following access levels allows a user to perform normal day to day work with their own files but does not allow them to change system files or computer performance?()

    • A、Administrator
    • B、User
    • C、Guest
    • D、Power user

    正确答案:B

  • 第18题:

    Which of the following security threats involves making phone calls?()

    • A、Phishing
    • B、Vishing
    • C、DDoS
    • D、Xmas attack

    正确答案:B

  • 第19题:

    A technician is troubleshooting a user’s problem; important Windows services are not starting. In which of the following locations should the technician check to investigate when these services started or stopped?()

    • A、Com+.log
    • B、System Log
    • C、Security Log
    • D、Application Log

    正确答案:B

  • 第20题:

    You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?()

    • A、Configure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.
    • B、Configure a security policy that references the unified-access-control captive-portal service.
    • C、Configure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.
    • D、Configure a security policy that references the unified-access-control intranet-controller service.

    正确答案:B,C

  • 第21题:

    单选题
    After creating backups of critical system and user data, which of the following is the BEST location to store the backups?()
    A

    In the supply closet so anyone can access them if needed

    B

    Near the server for easy access to restore files

    C

    Locked in a cabinet in the IT Manager’s office

    D

    At a secure off-site storage facility


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    Which feature would prevent guest users from gaining network access by unplugging an IP phone and connecting a laptop computer?()
    A

    IPSec VPN

    B

    SSL VPN

    C

    port security

    D

    port security with statically configured MAC addresses

    E

    private VLANs


    正确答案: D
    解析: 暂无解析

  • 第23题:

    多选题
    What are three security problems with Wi-Fi Protected Access (WPA)?()
    A

    WPA is based on the outdated IEEE 802.11i standard.

    B

    WPA uses RSN,which uses the same base encryption algorithm as RC4.

    C

    WPA requires a hardware upgrade that may not be supported by all vendors.

    D

    WPA uses TKIP,which uses the same base encryption algorithm as WEP.

    E

    WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.

    F

    WPA is susceptible to a security weakness when preshared keys are used.


    正确答案: B,A
    解析: 暂无解析