單項(xiàng)選擇題How doTCP SYN attacks take advantage ofTCPto prevent new connections from being established to a host under attack?()

A.These attacks send multiple FIN segments forcing TCP connection release.
B.These attacks fill up a hosts’ listen queue by failing to ACK partially openedTCPconnections.
C.These attacks take advantage of the hosts transmit backoff algorithm by sending jam signals to the host.
D.These attacks increment the ISN of each segment by a random number causing constant TCP retransmissions.
E.These attacks send TCP RST segments in response toconnection SYN+ACK segments forcing SYN retransmissions.





您可能感興趣的試卷

你可能感興趣的試題

2.單項(xiàng)選擇題Which IOS QoS mechanism is used strictly to rate limit traffic destinedto the router itself?()

A. Class-Based Policing
B. Control Plane Policing
C. Dual-Rate Policier
D. Single-Rate Policier
E. Class-BasedTraffic Shaper

3.多項(xiàng)選擇題Which of the following statements that describe Diffie Hellman Key exchange are correct? ()

A. A DH key exchange is an algorithm that utilizes asymmetric cryptographic keys.
B. The DH key exchange is used to establish a shared secret over an insecure medium during an IPSec phase 1 exchange.
C. The DH exchange is susceptible to man-in-the-middle attacks.
D. The DH exchange is used to authenticate the peer device duringan IPSec phase 1 exchange.
E.A DH exchange provides Perfect Forward Secrecy (PFS).

4.多項(xiàng)選擇題Which statements are true concerning NAT? ()

A. NAT provides 1 to manyaddress mapping.
B. NAT provides 1 to 1 address mapping.
C. NAT is only useful forTCP/UDP and ICMP traffic.
D. NAT can be used for all IP traffic.

6.單項(xiàng)選擇題In an L2TP voluntary tunneling scenario, the VPDN tunnel is terminated between:()

A. The client and the NAS.
B. The NAS andthe LNS.
C. The NAS and the LAC.
D. The client and the LNS.

7.多項(xiàng)選擇題Choose the most correct statements about SMTP/ESMTP. ()

A. Open mail relays are often used for spamming.
B. ESMTP does NOT provide more security features than SMTP
C. SMTPdoes provide authenticated email sending."
D. Worms often spread via SMTP.

8.單項(xiàng)選擇題What group in Cisco IOS does 1536-bit Diffie-Hellman prime modulus equivalent too?()

A. group 3
B. group 1
C. group 5
D. group 7

9.單項(xiàng)選擇題ASDM on the ASA platform is executed as:()

A. An active-x applicationor a java script application
B. A java script application and a PHP application.
C. A fully compiled .NET framework application
D. A fully operational Visual Basic application
E. A java applet running in the context of your browser or a stand alone application using the java run-timeenvironment

最新試題

What is true about SYN cookies?()

題型:單項(xiàng)選擇題

Which IOS QoS mechanism is used strictly to rate limit traffic destinedto the router itself?()

題型:單項(xiàng)選擇題

Which of the following is true about RADIUSV end or Specific Attribute? ()

題型:多項(xiàng)選擇題

Which SSL protocol takes anapplication message tobe transmitted, fragments the datainto manageable blocks, optionally compresses the data, applies a MAC, encrypts, adds a header, and transmits the resulting unit ina TCPsegment?()

題型:單項(xiàng)選擇題

With PGP, which of the following entity signs a users’s public key?()

題型:單項(xiàng)選擇題

Which is a benefit of implementing RFC 2827?()

題型:單項(xiàng)選擇題

Which ones are the two type of ciphers?()

題型:單項(xiàng)選擇題

ASDM on the ASA platform is executed as:()

題型:單項(xiàng)選擇題

What Cisco Switch feature best protects against CAM table overflow attacks?()

題型:單項(xiàng)選擇題

Of the threats discussed below, what is the main advantage of using Cisco Secure Desktop which is part of the Cisco ASA VPN solution?()

題型:單項(xiàng)選擇題