Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.
Access attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.
DoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.
DoS attacks can consist of IP spoofing and DDoS attacks.
IP spoofing can be reduced through the use of policy-based routing.
IP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.
第1题:
Which two statements about NTP version 4 are true?()
第2题:
Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4? (Choose two.)()
第3题:
A. VLANs increase the size of collision domains.
B. VLANs allow logical grouping of users by function.
C. VLANs simplify switch administration.
D. VLANs enhance network security.
第4题:
Which two statements describe the functions and operations of IDS and IPS systems?()
第5题:
Which two statements are true about optical networks?()
第6题:
Which two statements about an IDS are true?()
第7题:
Which two statements are true about L2TP tunnels?() (Choose two.)
第8题:
Which two of these statements best describe the benefits of WPAv2? (Choose two.)()
第9题:
Which two statements are true about the application of QoS in a converged network?()
第10题:
Which two statements are true about network voice traffic? (Choose two.)()