更多“Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?() ”相关问题
  • 第1题:

    Which of the following network topologies is characterized by a central server and uniqueconnections to all clients? ()

    A.Star

    B.Bus

    C.Mesh

    D.Ring


    参考答案:A

  • 第2题:

    Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server()。

    A.denial of service

    B.brute force

    C.reconnaissance

    D.Trojan horse


    参考答案:A

  • 第3题:

    Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()

    • A、close-connection
    • B、terminate-connection
    • C、close-client-and-server
    • D、terminate-session

    正确答案:C

  • 第4题:

    What are two reasons for packet loss on a VoIP connection?()

    • A、serialization delay
    • B、overrun
    • C、full buffers and queues
    • D、propagation delay
    • E、shaping delay
    • F、TCP header errors

    正确答案:B,C

  • 第5题:

    A web server is running correctly but sending a RST packet to any client trying to connect using HTTP on TCP port 80. Which of the following tools should be used to determine the listening port of the web server?()

    • A、Route
    • B、Ifconfig
    • C、Netstat
    • D、Nslookup

    正确答案:C

  • 第6题:

    Which of the following network topologies is characterized by a central server and uniqueconnections to all clients? ()

    • A、Star
    • B、Bus
    • C、Mesh
    • D、Ring

    正确答案:A

  • 第7题:

    Once the TCP connection is established, which message type initiates the BGP peering process?()

    • A、Open
    • B、Active
    • C、Update
    • D、Keepalive
    • E、Notification

    正确答案:A

  • 第8题:

    You are creating a shared Internet connection on your Windows 2000 Professional computer.  You want to enable other computers on the LAN to be able to access only HTTP and FTP sites on the Internet.   What should you do?()

    • A、Configure your shared Internet connection to disable LCP extensions.
    • B、Configure you shared Internet connection to disable on-demand dialing.
    • C、Create an Internet Connection Sharing application type for HTTP to use remote server port 25.
    • D、Create an Internet Connection Sharing application type for HTTP to use remote server port 80.
    • E、Create an Internet Connection Sharing application type for FTP to use remote server port 21.
    • F、Create an Internet Connection Sharing application type for FTP to use remote server port 72.

    正确答案:D,E

  • 第9题:

    单选题
    An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()
    A

    DoS

    B

    SYN flood

    C

    port scanning

    D

    IP address sweep


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    Once the TCP connection is established, which message type initiates the BGP peering process?()
    A

    Open

    B

    Active

    C

    Update

    D

    Keepalive

    E

    Notification


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    You are the network administrator for Company.  You configure an L2TP virtual private network (VPN) connection on your Windows 2000 Professional computer to remotely access Company’s Windows 2000 Routing and Remote Access server. The server is configured to accept a limited number of both PPTP and L2TP connections. You configure the VPN connection to use MS-CHAP v2 only and to require encryption. You also configure TCP/IP to obtain an IP address automatically. Many times when you try to connect, you are unable to because all of the ports are in use. Other times you are able to connect successfully.   You want to increase your chances of being able to connect to the server while ensuring that the most secure connection type available is used.   What should you do? ()
    A

    Enable the VPN connection to use MS-CHAP.

    B

    Specify a TCP/IP address in the Network properties.

    C

    Change the data encryption setting to Optional Encryption.

    D

    Configure the Type of VPN server I am calling to be Automatic.

    E

    Configure the Type of VPN server I am calling to be PPTP.


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()
    A

    denial of service

    B

    brute force

    C

    reconnaissance

    D

    Trojan horse


    正确答案: A
    解析: 暂无解析

  • 第13题:

    A user reports being occasionally disconnected from the server. Which of the following tools couldthe technician use to determine if it is the client or the server that is dropping the connection?()

    A. Packet sniffer

    B. Multimeter

    C. Load balancer

    D. Throughput tester


    参考答案:A

  • 第14题:

    A user opens a webpage that requires the transmission of packets from the Web server to the client's browser. The packets transmitted from the Web server to the client exceed the smallest MTU value on the communications path. Which two protocol functions allow this type of communication?()

    • A、packet segmentation
    • B、serialized checking
    • C、packet sequencing
    • D、parallel checking

    正确答案:A,C

  • 第15题:

    When running IP SLA, which application type should be used if you want to know round-trip delay, jitter, and packet loss for the full path?()

    • A、ICMP path echo
    • B、UDP echo
    • C、ICMP path jitter
    • D、Application Performance Monitor
    • E、TCP connect

    正确答案:C

  • 第16题:

    Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server()。

    • A、denial of service
    • B、brute force
    • C、reconnaissance
    • D、Trojan horse

    正确答案:A

  • 第17题:

    A user reports being occasionally disconnected from the server. Which of the following tools couldthe technician use to determine if it is the client or the server that is dropping the connection?()

    • A、Packet sniffer
    • B、Multimeter
    • C、Load balancer
    • D、Throughput tester

    正确答案:A

  • 第18题:

    Which Packet Flow Acceleration feature is most effective for short-lived TCP sessions?()

    • A、Active Flow Pipelining
    • B、Fast Connection Setup
    • C、TCP Acceleration (AFP)
    • D、Forward Error Correction

    正确答案:B

  • 第19题:

    Your company has a server that runs Windows Server 2008 R2. The server is configured as a remoteaccess server. The external firewall has TCP port 80 and TCP port 443 open for remoteconnections. You have a home computer that runs Windows 7. You need to establish secure remote accessconnection from the home computer to the remote access server.  Which type of connection should you configure? ()

    • A、IPSEC
    • B、L2TP
    • C、PPTP
    • D、SSTP

    正确答案:D

  • 第20题:

    多选题
    You are creating a shared Internet connection on your Windows 2000 Professional computer.  You want to enable other computers on the LAN to be able to access only HTTP and FTP sites on the Internet.   What should you do?()
    A

    Configure your shared Internet connection to disable LCP extensions.

    B

    Configure you shared Internet connection to disable on-demand dialing.

    C

    Create an Internet Connection Sharing application type for HTTP to use remote server port 25.

    D

    Create an Internet Connection Sharing application type for HTTP to use remote server port 80.

    E

    Create an Internet Connection Sharing application type for FTP to use remote server port 21.

    F

    Create an Internet Connection Sharing application type for FTP to use remote server port 72.


    正确答案: D,E
    解析: 暂无解析

  • 第21题:

    单选题
    How would you characterize the source and type in a denial of service attack on a router?()
    A

    By perfornubg a show ip interface to see the type and source of the attack based upon the access-listmatches

    B

    By performing a show interface to see the transmitted load txload and receive load rxload ;if the interface utilization is not maxed out ,there is no attack underway

    C

    By setting up an access-list to permit all ICMP,TCP,and UDP traffic with the log or log-input commands,then use the show access-list and show log commands to determine the type and sourceof attack

    D

    By applying an access-list to all incoming and outgoing interfaces,turning off route-cache on all interfaces,then,when telnetting into the router perform a debug IP packet detail


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()
    A

    close-connection

    B

    terminate-connection

    C

    close-client-and-server

    D

    terminate-session


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    Which Packet Flow Acceleration feature is most effective for short-lived TCP sessions?()
    A

    Active Flow Pipelining

    B

    Fast Connection Setup

    C

    TCP Acceleration (AFP)

    D

    Forward Error Correction


    正确答案: C
    解析: 暂无解析