关键词不能为空

当前您在: 主页 > 英语 >

歧视英语cisco网络安全答案1

作者:高考题库网
来源:https://www.bjmy2z.cn/gaokao
2021-01-20 10:53
tags:

人与环境-歧视英语

2021年1月20日发(作者:sicu)
is a ping sweep?
A ping sweep is a network scanning technique that indicates the live hosts in a range of IP addresses.

A ping sweep is a software application that enables the capture of all network packets sent across a LAN.

A ping sweep is a scanning technique that examines a range of TCP or UDP port numbers on a host to detect listening ser

A ping sweep is a query and response protocol that identifies information about a domain, including the addresses assigne

domain.



Observable
Description
2 points for Option 1
0 points for any other
option
2
2
Max
Value
Earned
Value
1
correctness of
response

2
Which access attack method involves a software program attempting to discover a system password by using an electronic dict
buffer overflow attack

port redirection attack

Denial of Service attack

brute-force attack

IP spoofing attack

packet sniffer attack




Observable
Description
2 points for Option 4
0 points for any other
option
2
0
Max
Value
Earned
Value
1
correctness of
response

3
How is a Smurf attack conducted?
by sending a large number of packets, overflowing the allocated buffer memory of the target device

by sending an echo request in an IP packet larger than the maximum packet size of 65,535 bytes

by sending a large number of ICMP requests to directed broadcast addresses from a spoofed source address on the sam

by sending a large number of TCP SYN packets to a target device from a spoofed source address




Observable
Description
2 points for Option 3
0 points for any other
option
2
2
Max
Value
Earned
Value
1
correctness of
response
4
A port scan is classified as what type of attack?
access attack

Denial of Service attack

reconnaissance attack

spoofing attack




Observable
Description
2 points for Option 3
0 points for any other
option
2
0
Max
Value
Earned
Value
1
correctness of
response
5

What are the basic phases of attack that can be used by a virus or worm in sequential order?
paralyze, probe, penetrate, persist, and propagate

probe, penetrate, persist, propagate, and paralyze

penetrate, persist, propagate, paralyze, and probe

persist, propagate, paralyze, probe, and penetrate




Observable
Description
2 points for Option 2
0 points for any other
option
2
0
Max
Value
Earned
Value
1
correctness of
response

6

What are the three major components of a worm attack? (Choose three.)
enabling vulnerability

infecting vulnerability

payload

penetration mechanism

probing mechanism

propagation mechanism




Observable
Description
Option 1, Option 3, and Option 6
1
correctness of
response
are correct.
1 point for each correct option.
0 points if more options are
selected than required.
Max
Value
Earned
Value
3
1
7
Which type of software typically uses a network adapter card in promiscuous mode to capture all network packets that are sent a
port scanner

ping sweeper

packet sniffer

Internet information query




Observable
Description
2 points for Option 3
0 points for any other
option
2
0
Max
Value
Earned
Value
1
correctness of
response

8
An attacker is using a laptop as a rogue access point to capture all network traffic from a targeted user. Which type of attack i
trust exploitation

buffer overflow

man in the middle

port redirection




Observable
Description
2 points for Option 3
0 points for any other
option
2
0
Max
Value
Earned
Value
1
correctness of
response
9
Which three options describe the phases of worm mitigation? (Choose three.)
The containment phase requires the use of incoming and outgoing ACLs on routers and firewalls.

The containment phase tracks down and identifies the infected machines within the contained areas.

The inoculation phase disconnects, blocks, or removes infected machines.

The inoculation phase patches uninfected systems with the appropriate vendor patch for the vulnerability.

The quarantine phase terminates the worm process, removes modified files or system settings, and patches the vulnera

used to exploit the system.
The treatment phase disinfects actively infected systems.




Observable
Description
Option 1, Option 4, and Option 6
1
correctness of
response
are correct.
1 point for each correct option.
0 points if more options are
selected than required.
Max
Value
Earned
Value
3
1
10
currently infected hosts from targeting and infecting other systems?
containment phase

inoculation phase

quarantine phase

treatment phase


Which phase of worm mitigation requires compartmentalization and segmentation of the network to slow down or stop the wor


Observable
Description
2 points for Option 1
0 points for any other
option
2
0
Max
Value
Earned
Value
1
correctness of
response
11
What is a characteristic of a Trojan Horse?
A Trojan Horse can be carried in a virus or worm.

A proxy Trojan Horse opens port 21 on the target system.

An FTP Trojan Horse stops anti-virus programs or firewalls from functioning.

A Trojan Horse can be hard to detect because it closes when the application that launched it closes.


人与环境-歧视英语


人与环境-歧视英语


人与环境-歧视英语


人与环境-歧视英语


人与环境-歧视英语


人与环境-歧视英语


人与环境-歧视英语


人与环境-歧视英语



本文更新与2021-01-20 10:53,由作者提供,不代表本网站立场,转载请注明出处:https://www.bjmy2z.cn/gaokao/538208.html

cisco网络安全答案1的相关文章

  • 余华爱情经典语录,余华爱情句子

    余华的经典语录——余华《第七天》40、我不怕死,一点都不怕,只怕再也不能看见你——余华《第七天》4可是我再也没遇到一个像福贵这样令我难忘的人了,对自己的经历如此清楚,

    语文
  • 心情低落的图片压抑,心情低落的图片发朋友圈

    心情压抑的图片(心太累没人理解的说说带图片)1、有时候很想找个人倾诉一下,却又不知从何说起,最终是什么也不说,只想快点睡过去,告诉自己,明天就好了。有时候,突然会觉得

    语文
  • 经典古训100句图片大全,古训名言警句

    古代经典励志名言100句译:好的药物味苦但对治病有利;忠言劝诫的话听起来不顺耳却对人的行为有利。3良言一句三冬暖,恶语伤人六月寒。喷泉的高度不会超过它的源头;一个人的事

    语文
  • 关于青春奋斗的名人名言鲁迅,关于青年奋斗的名言鲁迅

    鲁迅名言名句大全励志1、世上本没有路,走的人多了自然便成了路。下面是我整理的鲁迅先生的名言名句大全,希望对你有所帮助!当生存时,还是将遭践踏,将遭删刈,直至于死亡而

    语文
  • 三国群英单机版手游礼包码,三国群英手机单机版攻略

    三国群英传7五神兽洞有什么用那是多一个武将技能。青龙飞升召唤出东方的守护兽,神兽之一的青龙。玄武怒流召唤出北方的守护兽,神兽之一的玄武。白虎傲啸召唤出西方的守护兽,

    语文
  • 不收费的情感挽回专家电话,情感挽回免费咨询

    免费的情感挽回机构(揭秘情感挽回机构骗局)1、牛牛(化名)向上海市公安局金山分局报案,称自己为了挽回与女友的感情,被一家名为“实花教育咨询”的情感咨询机构诈骗4万余元。

    语文