单选题A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A WormB SmurfC Logic BombD Man-in-the-middle

题目
单选题
A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()
A

Worm

B

Smurf

C

Logic Bomb

D

Man-in-the-middle


相似考题
更多“单选题A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A WormB SmurfC Logic BombD Man-in-the-middle”相关问题
  • 第1题:

    An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?()

    A.netstat

    B.traceroute

    C.nbtstat

    D.ping


    参考答案:D

  • 第2题:

    Refer to the exhibit. Routing updates for the 192.168.1.0 network are being received from all three neighbors. Which statement is correct regarding the result of the con figuration shown? ()

    A. The router will prefer the next hop of 172.16.1.1 for packets destined for the 192.168.1.0 network.

    B. The router will prefer the next hop of 172.26.1.1 for packets destined for the 192.168.1.0 network.

    C. The router will adve rtise the 192.168.1.0 network only to 172.30.1.1.

    D. The router will advertise the 192.168.1.0 network only to 172.26.1.1.

    E. The router will prefer the next hop of 172.26.1.1 for packets except those destined for the 192.168.1.0 network.


    参考答案:B

  • 第3题:

    IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.

    A.pubic]
    B.private]
    C.personal
    D.proper

    答案:B
    解析:

  • 第4题:

    VOIP is being implemented in the Company network and you need to assess the need for QoS.   Which of the following network problems would indicate a need to implement QoS features?()

    • A、Mis-routed packets  
    • B、Excess jitter
    • C、Delay of critical traffic
    • D、Packet loss due to congestion
    • E、Data link layer broadcast storms
    • F、FTP connections unsuccessful

    正确答案:B,C,D

  • 第5题:

    Which CLI command ensures that RADIUS packets are being sent to and received from the RADIUS server?()

    • A、show radius
    • B、show aaa domain-map
    • C、show aaa statistics
    • D、show radius authentication server

    正确答案:C

  • 第6题:

    An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?()

    • A、netstat
    • B、traceroute
    • C、nbtstat
    • D、ping

    正确答案:D

  • 第7题:

    A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()

    • A、Worm
    • B、Smurf
    • C、Logic Bomb
    • D、Man-in-the-middle

    正确答案:B

  • 第8题:

    单选题
    Which CLI command ensures that RADIUS packets are being sent to and received from the RADIUS server?()
    A

    show radius

    B

    show aaa domain-map

    C

    show aaa statistics

    D

    show radius authentication server


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    A network at a small business utilizes a star topology and is experiencing frequent collisionsamong data packets. Which of the following devices is MOST likely being used?()
    A

    Unmanaged switch

    B

    Hardware firewall

    C

    Hub

    D

    Managed switch


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    What is the purpose of this command? ip route 0.0.0.0 0.0.0.0 serial0/0()
    A

    It configures a router to send all packets out interface serial 0/0.

    B

    It configures a router to block routing updates from being sent out interface serial 0/0.

    C

    It configures a router as a firewall, blocking all unauthorized packets from exiting serial 0/0.

    D

    It configures a router to send all packets for unknown destination networks out interface serial 0/0.

    E

    It configures a router to drop all packets for which the destination network is unknown.


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    In a point-to point network, which address are OSPF hello packets sent to?()
    A

    127.0.0.1

    B

    192.168.0.5

    C

    223.0.0.1

    D

    172.16.0.1

    E

    224.0.0.5

    F

    254.255.255.255.255


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?()
    A

    netstat

    B

    traceroute

    C

    nbtstat

    D

    ping


    正确答案: A
    解析: 暂无解析

  • 第13题:

    What is the purpose of this command? ip route 0.0.0.0 0.0.0.0 serial0/0()

    A. It configures a router to send all packets out interface serial 0/0.

    B. It configures a router to block routing updates from being sent out interface serial 0/0.

    C. It configures a router as a firewall, blocking all unauthorized packets from exiting serial 0/0.

    D. It configures a router to send all packets for unknown destination networks out interface serial 0/0.

    E. It configures a router to drop all packets for which the destination network is unknown.


    参考答案:D

  • 第14题:

    In a point-to point network, which address are OSPF hello packets sent to?()

    A.127.0.0.1

    B.192.168.0.5

    C.223.0.0.1

    D.172.16.0.1

    E.224.0.0.5

    F.254.255.255.255.255


    参考答案:E

  • 第15题:

    In a point-to point network, which address are OSPF hello packets sent to?()

    • A、127.0.0.1
    • B、192.168.0.5
    • C、223.0.0.1
    • D、172.16.0.1
    • E、224.0.0.5
    • F、254.255.255.255.255

    正确答案:E

  • 第16题:

    VOIP has been implemented at the main office of the Company network. Which two statements  are true about voice packets in a LAN?()

    • A、 Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media  portion of the VoIP communication.  
    • B、 Voice traffic data flow involves large volumes of large packets.  
    • C、 Because a packet loss involves a small amount of data, voice traffic is less affected by packet  losses than traditional data traffic is.  
    • D、 Voice packets are encapsulated in TCP segments to allow for proper sequencing during  delivery. 
    • E、 Voice packets are very sensitive to delay and jitter. 

    正确答案:A,E

  • 第17题:

    Which two statements about MPLS Label Distribution Protocol (LDP) are true? ()

    • A、LDP hello packets are sent to TCP 646.
    • B、LDP session packets are sent to TCP 646.
    • C、LDP session packets are sent to TCP 711.
    • D、LDP hello packets are sent to TCP 711.
    • E、LDP hello packets are sent to UDP 711.
    • F、LDP hello packets are sent to UDP 646.

    正确答案:B,F

  • 第18题:

    A network at a small business utilizes a star topology and is experiencing frequent collisionsamong data packets. Which of the following devices is MOST likely being used?()

    • A、Unmanaged switch
    • B、Hardware firewall
    • C、Hub
    • D、Managed switch

    正确答案:C

  • 第19题:

    A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?()

    • A、IGP
    • B、EIGRP
    • C、EGP
    • D、BGP

    正确答案:A

  • 第20题:

    单选题
    A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?()
    A

    IGP

    B

    EIGRP

    C

    EGP

    D

    BGP


    正确答案: B
    解析: 暂无解析

  • 第21题:

    多选题
    VOIP has been implemented at the main office of the Company network. Which two statements  are true about voice packets in a LAN?()
    A

    Voice carrier stream utilizes Real-Time Transport Protocol (RTP) to carry the audio/media  portion of the VoIP communication.

    B

    Voice traffic data flow involves large volumes of large packets.

    C

    Because a packet loss involves a small amount of data, voice traffic is less affected by packet  losses than traditional data traffic is.

    D

    Voice packets are encapsulated in TCP segments to allow for proper sequencing during  delivery.

    E

    Voice packets are very sensitive to delay and jitter.


    正确答案: B,D
    解析: 暂无解析

  • 第22题:

    多选题
    Which three best describe the customer benefits of the Cisco Lifecycle Services approach?()
    A

    improve the skill sets of its staff members

    B

    increase the value of and return on investment for its networks

    C

    increase network staff productivity

    D

    increase the amount of server room rack space

    E

    improve network availability, resiliency, security, and scalability

    F

    increase the amount of time required to integrate network changes


    正确答案: E,A
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements about MPLS Label Distribution Protocol (LDP) are true? ()
    A

    LDP hello packets are sent to TCP 646.

    B

    LDP session packets are sent to TCP 646.

    C

    LDP session packets are sent to TCP 711.

    D

    LDP hello packets are sent to TCP 711.

    E

    LDP hello packets are sent to UDP 711.

    F

    LDP hello packets are sent to UDP 646.


    正确答案: B,A
    解析: 暂无解析

  • 第24题:

    单选题
    A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()
    A

    Worm

    B

    Smurf

    C

    Logic Bomb

    D

    Man-in-the-middle


    正确答案: D
    解析: 暂无解析