單項(xiàng)選擇題Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()

A. denial of service
B. brute force
C. reconnaissance
D. Trojan horse


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題What is the default routing update period for RIPv2?()

A. 15 seconds
B. 30 seconds
C. 180 seconds
D. 240 seconds

2.單項(xiàng)選擇題An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm?()

A. The PC has connectivity with a local host.
B. The PC has connectivity with a Layer 3 device.
C. The PC has a default gateway correctly configured
D. The PC has connectivity up to Layer 5 of the OSI model
E. The PC has the TCP/IP protocol stack correctly installed.

3.單項(xiàng)選擇題How does using the service password encryption command on a router provide additional security? ()

A. by encrypting all passwords passing through the router
B. by encrypting passwords in the plain text configuration file
C. by requiring entry of encrypted passwords for access to the device
D. by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges
E. by automatically suggesting encrypted passwords for use in configuring the router

4.單項(xiàng)選擇題What is the maximum data rate specified for IEEE 802.11b WLANs?()

A. 10 Mbps
B. 11 Mbps
C. 54 Mbps
D. 100 Mbps

最新試題

While troubleshooting a network problem,a technician discovers that the current copy of the Cisco IOS is outdated and needs to be updated.Which of the following commands would the technician issue to replace the Cisco router IOS with the newer version?()

題型:單項(xiàng)選擇題

A network administrator is trying to add a new router into an established OSPF network.The networks attached to the new router do not appear in the routing tables of the other OSPF routers.Given the information in the partial configuration shown below,what configuration error is causing this problem?()Router(config)#router ospf 1Router(config-router)#network 10.0.0.0 255.0.0.0 area 0

題型:單項(xiàng)選擇題

Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()

題型:單項(xiàng)選擇題

Which command is used to display the collection of OSPF link states?()

題型:單項(xiàng)選擇題

Which statement describes the rule of split horizon?()

題型:單項(xiàng)選擇題

Three access ports have been installed and configured to a small office.What term defines the wireless topology?()

題型:單項(xiàng)選擇題

Which IPsec security protocol should be used when confidentiality is required?()

題型:單項(xiàng)選擇題

Which cisco ios command can help to determine the timing of various debug events,relative to each other,when you are debugging a complicated router issue?()

題型:單項(xiàng)選擇題

Which command displays the CHAP authentication process as it occurs between two routers?()

題型:單項(xiàng)選擇題

Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()

題型:單項(xiàng)選擇題