单选题A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()A It enables an attacker to perform an IP sweep of devices.B It enables a hacker to know which operating system th

题目
单选题
A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()
A

It enables an attacker to perform an IP sweep of devices.

B

It enables a hacker to know which operating system the system is running.

C

It can overflow the session table to its limit, which can result in rejection of legitimate traffic.

D

It creates a ping of death and can cause the entire network to be infected with a virus.


相似考题
更多“单选题A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()A It enables an attacker to perform an IP sweep of devices.B It enables a hacker to know which operating system th”相关问题
  • 第1题:

    An administrator is troubleshooting a problem on an application server, but has not determined the cause of the problem and is not able to replicate the problem. Which of the following should the administrator do prior to escalating the issue?()

    • A、Gather information from users.
    • B、Reboot the server.
    • C、Apply the latest service packs to the operating system.
    • D、Perform a root cause analysis

    正确答案:D

  • 第2题:

    What is the use of an "all configuration" backup in Cisco UCS?()

    • A、 Can be used to migrate from a 6120 to a 6140 and retain the same service profiles
    • B、 Can only be used on the fabric interconnect on which it was created
    • C、 Can be used to migrate from a 6120 to 6140 and retain system IP addresses and cluster information
    • D、 Can be used to match firmware versions between 6120 and 6140 during a migration

    正确答案:A

  • 第3题:

    An administrator is troubleshooting a problem on an application server, but has not determined the cause of the problem and is not able to replicate the problem.  Which of the following should the administrator do prior to escalating the issue?()

    • A、 Gather information from users.
    • B、 Reboot the server.
    • C、 Apply the latest service packs to the operating system.
    • D、 Perform a root cause analysis.

    正确答案:A

  • 第4题:

    After installing the base operating system and the Server bundle, a system administrator decides to remove several printer definitions that the system users will not need. Which of the following procedures is the best way for a system administrator to remove the extra printer definitions?()

    • A、Select the SMIT option to remove software products
    • B、Reinstall the desired filesets using the "Force Overwrite" option
    • C、Delete the unnecessary entries from the /usr/lpp/printers directory
    • D、Use the ODM edit (odem) utility to revmoe the definition from the system's ODM database

    正确答案:A

  • 第5题:

    Which two statements are true about the WebLogic Cluster ?()

    • A、 Clustered Servers capacity can be increased by adding new server instance to the cluster on an existing machine
    • B、 Clustered Servers can be on a same or different machine with same operating system only
    • C、 Clustered Servers can only be on a same machine or different operating system
    • D、 Clustered Servers can be on a same or different machine with same or different operating system

    正确答案:A,D

  • 第6题:

    You create a large, n-tier Web application that has a custom event tracking system. You need to create a custom event type that enables your event tracking system to record all relevant event details for all types of events. The events must be stored in Microsoft SQL Server. From which base type should your custom event type inherit? ()

    • A、IWebEventCustomEvaluator
    • B、WebEventProvider
    • C、WebBaseEvent
    • D、WebAuditEvent

    正确答案:C

  • 第7题:

    单选题
    What is the use of an "all configuration" backup in Cisco UCS?()
    A

     Can be used to migrate from a 6120 to a 6140 and retain the same service profiles

    B

     Can only be used on the fabric interconnect on which it was created

    C

     Can be used to migrate from a 6120 to 6140 and retain system IP addresses and cluster information

    D

     Can be used to match firmware versions between 6120 and 6140 during a migration


    正确答案: D
    解析: 暂无解析

  • 第8题:

    单选题
    The operating system partition on a server is nearly out of space on a Windows 2003 Server. The administrator notices that the file pagefile.sys is taking up nearly 2GB of space. Which of the following would BEST resolve this problem?()
    A

    Move the page file to a free drive.

    B

    Delete the file.

    C

    Add more memory.

    D

    Remove the page file from system properties


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    After installing the base operating system and the Server bundle, a system administrator decides to remove several printer definitions that the system users will not need. Which of the following procedures is the best way for a system administrator to remove the extra printer definitions?()
    A

    Select the SMIT option to remove software products

    B

    Reinstall the desired filesets using the Force Overwrite option

    C

    Delete the unnecessary entries from the /usr/lpp/printers directory

    D

    Use the ODM edit (odem) utility to revmoe the definition from the system's ODM database


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()
    A

    It enables an attacker to perform an IP sweep of devices.

    B

    It enables a hacker to know which operating system the system is running.

    C

    It can overflow the session table to its limit, which can result in rejection of legitimate traffic.

    D

    It creates a ping of death and can cause the entire network to be infected with a virus.


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    You create a large, n-tier Web application that has a custom event tracking system. You need to create a custom event type that enables your event tracking system to record all relevant event details for all types of events. The events must be stored in Microsoft SQL Server. From which base type should your custom event type inherit? ()
    A

    IWebEventCustomEvaluator

    B

    WebEventProvider

    C

    WebBaseEvent

    D

    WebAuditEvent


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    The ‘fsck -p /dev/lv00’command returned thefollowing message: Not a recognized filesystem type What is the likely cause of the problem and how should it be resolved?()
    A

    The file system superblock is dirty. It can be replaced from the VGDA

    B

    The logical volume superblock is dirty. It can be replaced from the VGDA

    C

    The file system superblock is dirty. It can be replaced from the secondary copy

    D

    The logical volume superblock is dirty. It can be replaced from the secondary copy


    正确答案: B
    解析: 暂无解析

  • 第13题:

    A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()

    • A、It enables an attacker to perform an IP sweep of devices.
    • B、It enables a hacker to know which operating system the system is running.
    • C、It can overflow the session table to its limit, which can result in rejection of legitimate traffic.
    • D、It creates a ping of death and can cause the entire network to be infected with a virus.

    正确答案:C

  • 第14题:

    Which of the following will help protect an operating system from vulnerability?()

    • A、Download free anti-virus programs from the Internet.
    • B、Perform updates from the manufacturers website regularly.
    • C、Using the operating systems email program only to open attachments.
    • D、Monitoring what is displayed on the screen.

    正确答案:B

  • 第15题:

    The ‘fsck -p /dev/lv00’ command returned the following message:Not a recognized filesystem type. What is the likely cause of the problem and how should it be resolved?()

    • A、The file system superblock is dirty. It can be replaced from the VGDA
    • B、The logical volume superblock is dirty. It can be replaced from the VGDA
    • C、The file system superblock is dirty. It can be replaced from the secondary copy
    • D、The logical volume superblock is dirty. It can be replaced from the secondary copy

    正确答案:C

  • 第16题:

    An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()

    • A、DoS
    • B、SYN flood
    • C、port scanning
    • D、IP address sweep

    正确答案:C

  • 第17题:

    You create a large, n-tier Web application that has a custom event tracking system. You need to create a custom event type that enables your event tracking system to record all relevant event details for all types of events. The events must be stored in Microsoft SQL Server. From which base type should your custom event type inherit? ()

    • A、IWeb Event Custom Evaluator
    • B、Web Event Provider
    • C、Web Base Event
    • D、Web Audit Event

    正确答案:C

  • 第18题:

    单选题
    The system administrator did a new install of AIX on a server about a week ago. The system was not rebooted after the installation. CDE is running on this system as is TCPIP. The system administrator has started configuring the system percompany directives. The power cable was inadvertently disconnected from the wall causing the sever to lose power. Upon reboot, the system appears to hang during log in from the console or from Xterminals. Which of the following is the most probable cause?()
    A

    It is a hardware problem caused by the power failure.

    B

    There is a network problem, most probably with name resolution.

    C

    Sine the system was never rebooted, devices are marked defined instead of available and need to be activated.

    D

    Some filesets may be marked as broken and need to be reinstalled.


    正确答案: C
    解析: 暂无解析

  • 第19题:

    单选题
    The staff is not able to access a database server.  The server has an ’Operating System not found’error and is set to boot from a fiber channel SAN. All other database servers are set to boot from the SAN and access the same switch and data as this database server. Which of the following is the MOST likely cause of the problem?()
    A

    The SAN is offline

    B

    Fiber channel switch

    C

    Multiple failed drives in the SAN

    D

    HBA


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    Which of the following will help protect an operating system from vulnerability?()
    A

    Download free anti-virus programs from the Internet.

    B

    Perform updates from the manufacturers website regularly.

    C

    Using the operating systems email program only to open attachments.

    D

    Monitoring what is displayed on the screen.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    A system administrator has filesystems that should not be mounted during system startup. How can the system administrator prevent the /data filesystem from being mounted during subsequent boots?()
    A

    mount -no /data

    B

    chfs -A no /data

    C

    mount -t nfs /data

    D

    chfs -a type=nfs /data


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    An administrator is troubleshooting a problem on an application server, but has not determined the cause of the problem and is not able to replicate the problem.  Which of the following should the administrator do prior to escalating the issue?()
    A

     Gather information from users.

    B

     Reboot the server.

    C

     Apply the latest service packs to the operating system.

    D

     Perform a root cause analysis.


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    You create a large, n-tier Web application that has a custom event tracking system. You need to create a custom event type that enables your event tracking system to record all relevant event details for all types of events. The events must be stored in Microsoft SQL Server. From which base type should your custom event type inherit? ()
    A

    IWeb Event Custom Evaluator

    B

    Web Event Provider

    C

    Web Base Event

    D

    Web Audit Event


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    An administrator is troubleshooting a problem on an application server, but has not determined the cause of the problem and is not able to replicate the problem. Which of the following should the administrator do prior to escalating the issue?()
    A

    Gather information from users.

    B

    Reboot the server.

    C

    Apply the latest service packs to the operating system.

    D

    Perform a root cause analysis


    正确答案: B
    解析: 暂无解析