單項選擇題Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server?()

A.denial of service
B.brute force
C.reconnaissance
D.Trojan horse 


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題The command frame-relay map ip 10.121.16.8 102 broadcast was entered on the router. Which of the following statements is true concerning this command?()

A.This command should be executed from the global configuration mode.
B.The IP address 10.121.16.8 is the local router port used to forward data.
C.102 is the remote DLCI that will receive the information.
D.This command is required for all Frame Relay configurations.
E.The broadcast option allows packets, such as RIP updates, to be forwarded across the PVC

3.多項選擇題What are two reasons that a network administrator would use access lists? (Choose two.) ()。

A.to control vty access into a router  
B.to control broadcast traffic through a router  
C.to filter traffic as it passes through a router  
D.to filter traffic that originates from the router  
E.to replace passwords as a line of defense against security incursions 

4.單項選擇題A default Frame Relay WAN is classified as what type of physical network?()

A.point-to-point  
B.broadcast multi-access  
C.nonbroadcast multi-access  
D.nonbroadcast multipoint 
E.broadcast point-to-multipoint 

最新試題

What is the default administrative distance of OSPF?()

題型:單項選擇題

A network administrator needs to configure a serial link between the main office and a remote location.The router at the remote office is a non-cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?()

題型:單項選擇題

An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()

題型:單項選擇題

Which statement describes the rule of split horizon?()

題型:單項選擇題

Which IPsec security protocol should be used when confidentiality is required?()

題型:單項選擇題

After the show ip route command has been entered,the follwing routes are displayed.Which route will not be entered into the routing table of a neighboring router?()

題型:單項選擇題

Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()

題型:單項選擇題

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

題型:單項選擇題

Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()

題型:單項選擇題

At which layer of the OSI model is RSTP used to prevent loops?()

題型:單項選擇題