Which two network attack statements are true?()

题目
多选题
Which two network attack statements are true?()
A

Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.

B

Access attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.

C

DoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.

D

DoS attacks can consist of IP spoofing and DDoS attacks.

E

IP spoofing can be reduced through the use of policy-based routing.

F

IP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two statements about NTP version 4 are true?()

  • A、It supports fast synchronization at starting and before network failures
  • B、It supports automatic server discovery
  • C、It uses a fixed-point arithmetion
  • D、It supports the "nanokernel" kernel implementation
  • E、It does not support Public-Key Cryptography

正确答案:B,D

第2题:

Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4? (Choose two.)()

  • A、It establishes a static route to the 172.16.3.0 network.
  • B、It establishes a static route to the 192.168.2.0 network.
  • C、It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network.
  • D、It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4.
  • E、It uses the default administrative distance.
  • F、It is a route that would be used last if other routes to the same destination exist.

正确答案:A,E

第3题:

Which two statements about the use of VLANs to segment a network are true?()

A. VLANs increase the size of collision domains.

B. VLANs allow logical grouping of users by function.

C. VLANs simplify switch administration.

D. VLANs enhance network security.


参考答案:B, D

第4题:

Which two statements describe the functions and operations of IDS and IPS systems?()

  • A、A network administrator entering a wrong password would generate a true-negative alarm.
  • B、A false positive alarm is generated when an IDS/IPS signature is correctly identified.
  • C、An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.
  • D、Cisco IDS works inline and stops attacks before they enter the network.
  • E、Cisco IPS taps the network traffic and responds after an attack.
  • F、Profile-based intrusion detection is also known as "anomaly detection".

正确答案:B,F

第5题:

Which two statements are true about optical networks?()

  • A、SONET and SDH both use time-division multiplexing.
  • B、An optical transport network system uses time-division multiplexing.
  • C、SONET and SDH both use wavelength-division multiplexing.
  • D、An optical transport network system uses wavelength-division multiplexing.

正确答案:A,D

第6题:

Which two statements about an IDS are true?()

  • A、The IDS is in the traffic path.
  • B、The IDS can send TCP resets to the source device.
  • C、The IDS can send TCP resets to the destination device.
  • D、The IDS listens promiscuously to all traffic on the network.
  • E、Default operation is for the IDS to discard malicious traffic.

正确答案:B,D

第7题:

Which two statements are true about L2TP tunnels?() (Choose two.)

  • A、Traffic is clear text
  • B、Traffic is encrypted 
  • C、They are initiated by the LNS
  • D、They are initiated by the LAC

正确答案:A,D

第8题:

Which two of these statements best describe the benefits of WPAv2? (Choose two.)()

  • A、 SSID broadcast prevention
  • B、 man-in-the-middle attack protection
  • C、 cost reduction through software upgrades in all existing hardware
  • D、 dynamic key generation
  • E、 RF jamming prevention

正确答案:B,D

第9题:

Which two statements are true about the application of QoS in a converged network?()

  • A、end-to-end network delay times that exceed 50 ms for real-time traffic are considered unacceptable
  • B、end-to-end network delay times that exceed 250 ms for real-time traffic are considered unacceptable
  • C、end-to-end network delay is not a factor as long as the  delay is consistent
  • D、some packet loss can be corrected by codec algorithms
  • E、RSVP handles voice packet retransmission
  • F、fragmentation is a result of packet loss

正确答案:B,D

第10题:

Which two statements are true about network voice traffic? (Choose two.)()

  • A、 Voice traffic is affected more by link speed than FTP traffic is.
  • B、 Voice traffic is affected more by packet delays than FTP traffic is.
  • C、 Voice streams involve larger packet sizes than most TCP network traffic involves.
  • D、 Voice traffic is more sensitive to packet loss than TCP network traffic is.
  • E、 Voice traffic requires QOS mechanisms only in heavily loaded network segments.

正确答案:B,D

更多相关问题