單項選擇題Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()

A. denial of service
B. brute force
C. reconnaissance
D. Trojan horse


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題What is the default routing update period for RIPv2?()

A. 15 seconds
B. 30 seconds
C. 180 seconds
D. 240 seconds

2.單項選擇題An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm?()

A. The PC has connectivity with a local host.
B. The PC has connectivity with a Layer 3 device.
C. The PC has a default gateway correctly configured
D. The PC has connectivity up to Layer 5 of the OSI model
E. The PC has the TCP/IP protocol stack correctly installed.

3.單項選擇題How does using the service password encryption command on a router provide additional security? ()

A. by encrypting all passwords passing through the router
B. by encrypting passwords in the plain text configuration file
C. by requiring entry of encrypted passwords for access to the device
D. by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges
E. by automatically suggesting encrypted passwords for use in configuring the router

4.單項選擇題What is the maximum data rate specified for IEEE 802.11b WLANs?()

A. 10 Mbps
B. 11 Mbps
C. 54 Mbps
D. 100 Mbps

最新試題

Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()

題型:單項選擇題

On which options are standard access list based?()

題型:單項選擇題

Three switches are connected to one anther via trunk ports.Assuming the default switch configuration,which switch is elected as the root bridge for the spanning-tree instance of vlan 1?()

題型:單項選擇題

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

題型:單項選擇題

If all OSPF routers in a single area are configured with the same priority value,what value dose a router use for the ODPF router ID in the absence of a loopback interface?()

題型:單項選擇題

Which statement describes the rule of split horizon?()

題型:單項選擇題

When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()

題型:單項選擇題

Which command is used to display the collection of OSPF link states?()

題型:單項選擇題

At which layer of the OSI model is RSTP used to prevent loops?()

題型:單項選擇題

A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()

題型:單項選擇題