单选题An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()A DoSB SYN floodC port scanningD IP address sweep

题目
单选题
An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()
A

DoS

B

SYN flood

C

port scanning

D

IP address sweep


相似考题
更多“单选题An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()A DoSB SYN floodC port scanningD IP address sweep”相关问题
  • 第1题:

    TCP/IP的通信过程是?()

    • A、——SYN/ACK——>,<——ACK,——SYN/ACK——>
    • B、——SYN/ACK——>,<——SYN/ACK——,——ACK——>
    • C、——SYN——>,<——ACK,——SYN——>,<——ACK——
    • D、——SYN——>,<——SYN/ACK——,——ACK——>

    正确答案:D

  • 第2题:

    NBAR supports all of these with the exception of which one?()

    • A、HTTP
    • B、IP multicast
    • C、TCP flows with dynamically assigned port numbers
    • D、non-UDP protocols

    正确答案:B

  • 第3题:

    For which network anomaly does Junos provide a SCREEN?()

    • A、a telnet to port 80
    • B、a TCP packet with the SYN and ACK flags set
    • C、an SNMP getnext request
    • D、an ICMP packet larger than 1024 bytes

    正确答案:D

  • 第4题:

    下面利用TCP的三次握手原理进行的攻击是()。

    • A、IP欺骗
    • B、SYN Flood
    • C、Sumrf攻击
    • D、Land攻击

    正确答案:B

  • 第5题:

    How doTCP SYN attacks take advantage ofTCPto prevent new connections from being established to a host under attack?()

    • A、These attacks send multiple FIN segments forcing TCP connection release.
    • B、These attacks fill up a hosts’ listen queue by failing to ACK partially openedTCPconnections.
    • C、These attacks take advantage of the hosts transmit backoff algorithm by sending jam signals to the host.
    • D、These attacks increment the ISN of each segment by a random number causing constant TCP retransmissions.
    • E、These attacks send TCP RST segments in response toconnection SYN+ACK segments forcing SYN retransmissions.

    正确答案:B

  • 第6题:

    Which parameters must you select when configuring operating system probes SCREEN options?()

    • A、syn-fin, syn-flood, and tcp-no-frag
    • B、syn-fin, port-scan, and tcp-no-flag
    • C、syn-fin, fin-no-ack, and tcp-no-frag
    • D、syn-fin, syn-ack-ack-proxy, and tcp-no-frag

    正确答案:C

  • 第7题:

    Which parameters are valid SCREEN options for combating operating system probes?()

    • A、syn-fin, syn-flood, and tcp-no-frag
    • B、syn-fin, port-scan, and tcp-no-flag
    • C、syn-fin, fin-no-ack, and tcp-no-frag
    • D、syn-fin, syn-ack-ack-proxy, and tcp-no-frag

    正确答案:C

  • 第8题:

    On which destination port in the Layer 4 header does BGP listen?()

    • A、UDP port 169
    • B、TCP port 169
    • C、UDP port 179
    • D、TCP port 179

    正确答案:D

  • 第9题:

    单选题
    Interface ge-0/0/2.0 of your device is attached to the Internet and is configured with an IP address andnetwork mask of 71.33.252.17/24. A webserver with IP address 10.20.20.1 isrunning an HTTP service on TCP port 8080. The webserver is attached to the ge-0/0/0.0 interface of yourdevice. You must use NAT to make the webserver reachable from the Internet using port translation.Which type of NAT must you configure?()
    A

    source NAT with address shifting

    B

    pool-based source NAT

    C

    static destination NAT

    D

    pool-based destination NAT


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    For which network anomaly does Junos provide a SCREEN?()
    A

    a telnet to port 80

    B

    a TCP packet with the SYN and ACK flags set

    C

    an SNMP getnext request

    D

    an ICMP packet larger than 1024 bytes


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    To initiate testing,  which port does a Cisco IOS IP SLA source use to send a control message to an IP SLA responder? ()
    A

    UDP port 2020

    B

    UDP port 1967

    C

    TCP port 2020

    D

    ICMP port 1967


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    Interface ge-0/0/2.0 of your router is attached to the Internet and is configured with an IP address and network mask of 71.33.252.17/24. A host with IP address 10.20.20.1 is running an HTTP service on TCP port 8080. This host isattached to the ge-0/0/0.0 interface of your router. You must use interface-based static NAT to make the HTTP service on the host reachable from the Internet. On which IP address and TCP port can Internet hosts reach the HTTP service?()
    A

    IP address 10.10.10.1 and TCP port 8080

    B

    IP address 71.33.252.17 and TCP port 80

    C

    IP address 71.33.251.19 and TCP port 80

    D

    IP address 71.33.252.19 and TCP port 8080


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Which of the following descriptions about IP spoofing is correct?()

    • A、IP source address is forged
    • B、IP destination address is forged
    • C、IP TCP source port is forged
    • D、IP TCP destination port is forged
    • E、None of above

    正确答案:A

  • 第14题:

    Interface ge-0/0/2.0 of your router is attached to the Internet and is configured with an IP address and network mask of 71.33.252.17/24. A host with IP address 10.20.20.1 is running an HTTP service on TCP port 8080. This host isattached to the ge-0/0/0.0 interface of your router. You must use interface-based static NAT to make the HTTP service on the host reachable from the Internet. On which IP address and TCP port can Internet hosts reach the HTTP service?()

    • A、IP address 10.10.10.1 and TCP port 8080
    • B、IP address 71.33.252.17 and TCP port 80
    • C、IP address 71.33.251.19 and TCP port 80
    • D、IP address 71.33.252.19 and TCP port 8080

    正确答案:D

  • 第15题:

    Nmap工具不可以执行下列哪种方式扫描()。

    • A、目录遍历扫描
    • B、TCP SYN扫描
    • C、TCP connect扫描
    • D、UDP port扫描

    正确答案:A

  • 第16题:

    To initiate testing,  which port does a Cisco IOS IP SLA source use to send a control message to an IP SLA responder? ()

    • A、UDP port 2020
    • B、UDP port 1967
    • C、TCP port 2020
    • D、ICMP port 1967

    正确答案:B

  • 第17题:

    Which of the following would an attacker use to footprint a system?()

    • A、RADIUS
    • B、Password cracker
    • C、Port scanner
    • D、Man-in-the-middle attack

    正确答案:C

  • 第18题:

    Which two types of attacks are considered to be denial of service?() (Choose two.)

    • A、zombie agents
    • B、SYN flood
    • C、IP packet fragments
    • D、WinNuke

    正确答案:B,D

  • 第19题:

    An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()

    • A、DoS
    • B、SYN flood
    • C、port scanning
    • D、IP address sweep

    正确答案:C

  • 第20题:

    单选题
    An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()
    A

    DoS

    B

    SYN flood

    C

    port scanning

    D

    IP address sweep


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following descriptions about IP spoofing is correct?()
    A

    IP source address is forged

    B

    IP destination address is forged

    C

    IP TCP source port is forged

    D

    IP TCP destination port is forged

    E

    None of above


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    How doTCP SYN attacks take advantage ofTCPto prevent new connections from being established to a host under attack?()
    A

    These attacks send multiple FIN segments forcing TCP connection release.

    B

    These attacks fill up a hosts’ listen queue by failing to ACK partially openedTCPconnections.

    C

    These attacks take advantage of the hosts transmit backoff algorithm by sending jam signals to the host.

    D

    These attacks increment the ISN of each segment by a random number causing constant TCP retransmissions.

    E

    These attacks send TCP RST segments in response toconnection SYN+ACK segments forcing SYN retransmissions.


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    Which parameters are valid SCREEN options for combating operating system probes?()
    A

    syn-fin, syn-flood, and tcp-no-frag

    B

    syn-fin, port-scan, and tcp-no-flag

    C

    syn-fin, fin-no-ack, and tcp-no-frag

    D

    syn-fin, syn-ack-ack-proxy, and tcp-no-frag


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    Which parameters must you select when configuring operating system probes SCREEN options?()
    A

    syn-fin, syn-flood, and tcp-no-frag

    B

    syn-fin, port-scan, and tcp-no-flag

    C

    syn-fin, fin-no-ack, and tcp-no-frag

    D

    syn-fin, syn-ack-ack-proxy, and tcp-no-frag


    正确答案: B
    解析: 暂无解析