关键词不能为空

当前您在: 主页 > 英语 >

歧视英语cisco网络安全答案1

作者:高考题库网
来源:https://www.bjmy2z.cn/gaokao
2021-01-20 10:53
tags:

人与环境-歧视英语

2021年1月20日发(作者:sicu)
is a ping sweep?
A ping sweep is a network scanning technique that indicates the live hosts in a range of IP addresses.

A ping sweep is a software application that enables the capture of all network packets sent across a LAN.

A ping sweep is a scanning technique that examines a range of TCP or UDP port numbers on a host to detect listening ser

A ping sweep is a query and response protocol that identifies information about a domain, including the addresses assigne

domain.



Observable
Description
2 points for Option 1
0 points for any other
option
2
2
Max
Value
Earned
Value
1
correctness of
response

2
Which access attack method involves a software program attempting to discover a system password by using an electronic dict
buffer overflow attack

port redirection attack

Denial of Service attack

brute-force attack

IP spoofing attack

packet sniffer attack




Observable
Description
2 points for Option 4
0 points for any other
option
2
0
Max
Value
Earned
Value
1
correctness of
response

3
How is a Smurf attack conducted?
by sending a large number of packets, overflowing the allocated buffer memory of the target device

by sending an echo request in an IP packet larger than the maximum packet size of 65,535 bytes

by sending a large number of ICMP requests to directed broadcast addresses from a spoofed source address on the sam

by sending a large number of TCP SYN packets to a target device from a spoofed source address




Observable
Description
2 points for Option 3
0 points for any other
option
2
2
Max
Value
Earned
Value
1
correctness of
response
4
A port scan is classified as what type of attack?
access attack

Denial of Service attack

reconnaissance attack

spoofing attack




Observable
Description
2 points for Option 3
0 points for any other
option
2
0
Max
Value
Earned
Value
1
correctness of
response
5

What are the basic phases of attack that can be used by a virus or worm in sequential order?
paralyze, probe, penetrate, persist, and propagate

probe, penetrate, persist, propagate, and paralyze

penetrate, persist, propagate, paralyze, and probe

persist, propagate, paralyze, probe, and penetrate




Observable
Description
2 points for Option 2
0 points for any other
option
2
0
Max
Value
Earned
Value
1
correctness of
response

6

What are the three major components of a worm attack? (Choose three.)
enabling vulnerability

infecting vulnerability

payload

penetration mechanism

probing mechanism

propagation mechanism




Observable
Description
Option 1, Option 3, and Option 6
1
correctness of
response
are correct.
1 point for each correct option.
0 points if more options are
selected than required.
Max
Value
Earned
Value
3
1
7
Which type of software typically uses a network adapter card in promiscuous mode to capture all network packets that are sent a
port scanner

ping sweeper

packet sniffer

Internet information query




Observable
Description
2 points for Option 3
0 points for any other
option
2
0
Max
Value
Earned
Value
1
correctness of
response

8
An attacker is using a laptop as a rogue access point to capture all network traffic from a targeted user. Which type of attack i
trust exploitation

buffer overflow

man in the middle

port redirection




Observable
Description
2 points for Option 3
0 points for any other
option
2
0
Max
Value
Earned
Value
1
correctness of
response
9
Which three options describe the phases of worm mitigation? (Choose three.)
The containment phase requires the use of incoming and outgoing ACLs on routers and firewalls.

The containment phase tracks down and identifies the infected machines within the contained areas.

The inoculation phase disconnects, blocks, or removes infected machines.

The inoculation phase patches uninfected systems with the appropriate vendor patch for the vulnerability.

The quarantine phase terminates the worm process, removes modified files or system settings, and patches the vulnera

used to exploit the system.
The treatment phase disinfects actively infected systems.




Observable
Description
Option 1, Option 4, and Option 6
1
correctness of
response
are correct.
1 point for each correct option.
0 points if more options are
selected than required.
Max
Value
Earned
Value
3
1
10
currently infected hosts from targeting and infecting other systems?
containment phase

inoculation phase

quarantine phase

treatment phase


Which phase of worm mitigation requires compartmentalization and segmentation of the network to slow down or stop the wor


Observable
Description
2 points for Option 1
0 points for any other
option
2
0
Max
Value
Earned
Value
1
correctness of
response
11
What is a characteristic of a Trojan Horse?
A Trojan Horse can be carried in a virus or worm.

A proxy Trojan Horse opens port 21 on the target system.

An FTP Trojan Horse stops anti-virus programs or firewalls from functioning.

A Trojan Horse can be hard to detect because it closes when the application that launched it closes.


人与环境-歧视英语


人与环境-歧视英语


人与环境-歧视英语


人与环境-歧视英语


人与环境-歧视英语


人与环境-歧视英语


人与环境-歧视英语


人与环境-歧视英语



本文更新与2021-01-20 10:53,由作者提供,不代表本网站立场,转载请注明出处:https://www.bjmy2z.cn/gaokao/538208.html

cisco网络安全答案1的相关文章

  • 爱心与尊严的高中作文题库

    1.关于爱心和尊严的作文八百字 我们不必怀疑富翁的捐助,毕竟普施爱心,善莫大焉,它是一 种美;我们也不必指责苛求受捐者的冷漠的拒绝,因为人总是有尊 严的,这也是一种美。

    小学作文
  • 爱心与尊严高中作文题库

    1.关于爱心和尊严的作文八百字 我们不必怀疑富翁的捐助,毕竟普施爱心,善莫大焉,它是一 种美;我们也不必指责苛求受捐者的冷漠的拒绝,因为人总是有尊 严的,这也是一种美。

    小学作文
  • 爱心与尊重的作文题库

    1.作文关爱与尊重议论文 如果说没有爱就没有教育的话,那么离开了尊重同样也谈不上教育。 因为每一位孩子都渴望得到他人的尊重,尤其是教师的尊重。可是在现实生活中,不时会有

    小学作文
  • 爱心责任100字作文题库

    1.有关爱心,坚持,责任的作文题库各三个 一则150字左右 (要事例) “胜不骄,败不馁”这句话我常听外婆说起。 这句名言的意思是说胜利了抄不骄傲,失败了不气馁。我真正体会到它

    小学作文
  • 爱心责任心的作文题库

    1.有关爱心,坚持,责任的作文题库各三个 一则150字左右 (要事例) “胜不骄,败不馁”这句话我常听外婆说起。 这句名言的意思是说胜利了抄不骄傲,失败了不气馁。我真正体会到它

    小学作文
  • 爱心责任作文题库

    1.有关爱心,坚持,责任的作文题库各三个 一则150字左右 (要事例) “胜不骄,败不馁”这句话我常听外婆说起。 这句名言的意思是说胜利了抄不骄傲,失败了不气馁。我真正体会到它

    小学作文