人与环境-歧视英语
is a ping sweep?
A ping sweep is a network scanning technique that indicates the live hosts in a range of IP addresses.
A ping sweep is a software application that enables the capture of all network packets sent across a LAN.
A ping sweep is a scanning technique that examines a range of TCP or UDP port numbers on a host to detect listening ser
A ping sweep is a query and response protocol that identifies information about a domain, including the addresses assigne
domain.
Observable
Description
2 points for Option 1
0 points for any other
option
2
2
Max
Value
Earned
Value
1
correctness of
response
2
Which access attack method involves a software program attempting to discover a system password by using an electronic dict
buffer overflow attack
port redirection attack
Denial of Service attack
brute-force attack
IP spoofing attack
packet sniffer attack
Observable
Description
2 points for Option 4
0 points for any other
option
2
0
Max
Value
Earned
Value
1
correctness of
response
3
How is a Smurf attack conducted?
by sending a large number of packets, overflowing the allocated buffer memory of the target device
by sending an echo request in an IP packet larger than the maximum packet size of 65,535 bytes
by sending a large number of ICMP requests to directed broadcast addresses from a spoofed source address on the sam
by sending a large number of TCP SYN packets to a target device from a spoofed source address
Observable
Description
2 points for Option 3
0 points for any other
option
2
2
Max
Value
Earned
Value
1
correctness of
response
4
A port scan is classified as what type of attack?
access attack
Denial of Service attack
reconnaissance attack
spoofing attack
Observable
Description
2 points for Option 3
0 points for any other
option
2
0
Max
Value
Earned
Value
1
correctness of
response
5
What are the basic phases of attack that can be used by a virus or worm in sequential order?
paralyze, probe, penetrate, persist, and propagate
probe, penetrate, persist, propagate, and paralyze
penetrate, persist, propagate, paralyze, and probe
persist, propagate, paralyze, probe, and penetrate
Observable
Description
2 points for Option 2
0 points for any other
option
2
0
Max
Value
Earned
Value
1
correctness of
response
6
What are the three major components of a worm attack? (Choose three.)
enabling vulnerability
infecting vulnerability
payload
penetration mechanism
probing mechanism
propagation mechanism
Observable
Description
Option 1, Option 3, and Option 6
1
correctness of
response
are correct.
1 point for each correct option.
0 points if more options are
selected than required.
Max
Value
Earned
Value
3
1
7
Which type of software typically uses a network adapter card in promiscuous mode to capture all network packets that are sent a
port scanner
ping sweeper
packet sniffer
Internet information query
Observable
Description
2 points for Option 3
0 points for any other
option
2
0
Max
Value
Earned
Value
1
correctness of
response
8
An attacker is using a laptop as a rogue access point to capture all network traffic from a targeted user. Which type of attack i
trust exploitation
buffer overflow
man in the middle
port redirection
Observable
Description
2 points for Option 3
0 points for any other
option
2
0
Max
Value
Earned
Value
1
correctness of
response
9
Which three options describe the phases of worm mitigation? (Choose three.)
The containment phase requires the use of incoming and outgoing ACLs on routers and firewalls.
The containment phase tracks down and identifies the infected machines within the contained areas.
The inoculation phase disconnects, blocks, or removes infected machines.
The inoculation phase patches uninfected systems with the appropriate vendor patch for the vulnerability.
The quarantine phase terminates the worm process, removes modified files or system settings, and patches the vulnera
used to exploit the system.
The treatment phase disinfects actively infected systems.
Observable
Description
Option 1, Option 4, and Option 6
1
correctness of
response
are correct.
1 point for each correct option.
0 points if more options are
selected than required.
Max
Value
Earned
Value
3
1
10
currently infected hosts from targeting and infecting other systems?
containment phase
inoculation phase
quarantine phase
treatment phase
Which phase of worm mitigation requires compartmentalization and segmentation of the network to slow down or stop the wor
Observable
Description
2 points for Option 1
0 points for any other
option
2
0
Max
Value
Earned
Value
1
correctness of
response
11
What is a characteristic of a Trojan Horse?
A Trojan Horse can be carried in a virus or worm.
A proxy Trojan Horse opens port 21 on the target system.
An FTP Trojan Horse stops anti-virus programs or firewalls from functioning.
A Trojan Horse can be hard to detect because it closes when the application that launched it closes.
人与环境-歧视英语
人与环境-歧视英语
人与环境-歧视英语
人与环境-歧视英语
人与环境-歧视英语
人与环境-歧视英语
人与环境-歧视英语
人与环境-歧视英语
本文更新与2021-01-20 10:53,由作者提供,不代表本网站立场,转载请注明出处:https://www.bjmy2z.cn/gaokao/538208.html
-
上一篇:选修7 Unit 2 Robots练习含答案
下一篇:08年英语专四听力原文和答案