A. denial of service
B. brute force
C. reconnaissance
D. Trojan horse
您可能感興趣的試卷
你可能感興趣的試題
A. 15 seconds
B. 30 seconds
C. 180 seconds
D. 240 seconds
A. The PC has connectivity with a local host.
B. The PC has connectivity with a Layer 3 device.
C. The PC has a default gateway correctly configured
D. The PC has connectivity up to Layer 5 of the OSI model
E. The PC has the TCP/IP protocol stack correctly installed.
A. by encrypting all passwords passing through the router
B. by encrypting passwords in the plain text configuration file
C. by requiring entry of encrypted passwords for access to the device
D. by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges
E. by automatically suggesting encrypted passwords for use in configuring the router
A. 10 Mbps
B. 11 Mbps
C. 54 Mbps
D. 100 Mbps
A. ARP
B. SSH
C. Telnet
D. WEP
E. SNMPv1
F. SNMPv2
A. 4to6 routing
B. 6to4 routing
C. binary routing
D. dual-stack routing
E. NextGen routing
A. to provide routing to a local web server
B. to provide routing from an ISP to a stub network
C. to provide routing that will override the configured dynamic routing protocol
D. to provide routing to a destination that is not specified in the routing table and which is outside the local network
A. the OSPF route
B. the EIGRP route
C. the RIPv2 route
D. all three routes
E. the OSPF and RIPv2 routes
A. Lower the bridge priority number.
B. Change the MAC address of the switch.
C. Increase the VTP revision number for the domain.
D. Lower the root path cost on the switch ports.
E. Assign the switch an IP address with the lowest value.
A. show ip interface [interface] access-lists
B. show ip access-lists interface [interface]
C. show ip interface [interface]
D. show ip access-lists [interface]
最新試題
After the show ip route command has been entered,the follwing routes are displayed.Which route will not be entered into the routing table of a neighboring router?()
What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?()
Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()
Which IPsec security protocol should be used when confidentiality is required?()
How are VTP advertisements delivered to switches across the network?()
What is the default administrative distance of OSPF?()
Which pairing reflects a correct protocol-and-metric relationship?()
Which command displays the CHAP authentication process as it occurs between two routers?()
You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the max number of subnets.Which network address and subnet mask meet this requirement?()
On which options are standard access list based?()