Which two types of attacks are considered to be denial of se

题目
多选题
Which two types of attacks are considered to be denial of service?() (Choose two.)
A

zombie agents

B

SYN flood

C

IP packet fragments

D

WinNuke

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.)

A. rate limiting of ICMP

B. RADIUS authorizations

C. source address validation

D. stateful firewall on the router


参考答案:A, C

第2题:

Which two policy actions are considered flow control actions?()

A.reject

B.community add

C.next term

D.next policy


参考答案:C, D

第3题:

Which two types of attacks are considered to be denial of service?() (Choose two.)

A. zombie agents

B. SYN flood

C. IP packet fragments

D. WinNuke


参考答案:B, D

第4题:

What are two benefits of control plane policing?()

  • A、protection against denial of service (DoS) attacks at infrastructure routers and switches
  • B、 protection against known worm attacks in routers and switches
  • C、quality of service (QoS) control for packets that are sourced from the data plane of Cisco routers and switches
  • D、quality of service control (QoS) for packets that are destined to the control plane of Cisco routers and switches
  • E、quality of service (QoS) control for packets that are destined to the data plane of Cisco routers and switches

正确答案:A,D

第5题:

Which two of these multicast deployments are most susceptible to attacks from unknown sources?()

  • A、ASM
  • B、BiDirPIM
  • C、PIM-SMRP
  • D、RP-Switchover
  • E、SourceSpecificMulticast

正确答案:A,B

第6题:

An RSVP session is maintained with the periodic exchange of which two message types?() (Choose two.)

A.path

B.resv

C.session

D.keepalive


参考答案:A, B

第7题:

Which two of these multicast deployments are most susceptible to attacks from unknown sources?()

A.ASM

B.BiDirPIM

C.PIM-SMRP

D.RP-Switchover

E.SourceSpecificMulticast


参考答案:A, B

第8题:

Which two benefits does the Juniper DX provide?() (Choose two.)

A. It compresses all images.

B. It protects servers from DDoS attacks.

C. It protects servers from SynFlood attacks.

D. It loads all content from web servers to flash.


参考答案:B, C

第9题:

In a RSTP implementation, which of the following two link types are used? ()(Choose two.)

  • A、Shared
  • B、Point-to-Point
  • C、Designated
  • D、Multiaccess non-broadcast

正确答案:A,B

第10题:

Which two of these multicast deployments are most susceptible to attacks from unknown sources?()

  • A、 ASM
  • B、 BiDir PIM
  • C、 PIM-SM RP
  • D、 RP-Switchover
  • E、 Source Specific Multicast

正确答案:A,B

更多相关问题