Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?()
第1题:
A.Update antivirus definitions
B.MAC filtering
C.Effective security policies
D.User awareness training
第2题:
A customer wants to check whether they have the necessary tools enabled to prevent intrusions andvirus attacks on a Windows Vista workstation. Which of the following tools can be used to display thecurrent configuration? ()
第3题:
A. Honeynet
B. Honeypot
C. Vulnerability scanner
D. Network based IDS
第4题:
Birthday attacks are used against which of the following?()
第5题:
Which two statements about common network attacks are true?()
第6题:
Which of the following is NOT true of security attacks?
[A] Employees will keep up with security polices and awareness if they are highly-trained.
[B] The rate of security attacks appears faster than the growth of the Internet.
[C] One's computer system will never be secure.
[D] Vulnerabilities can go through phones, wireless devices, and network appliances
第7题:
You are responsible for increasing the security within the Company LAN. Of the following choices listed below, which is true regarding layer 2 security and mitigation techniques? ()
第8题:
A. The layer 3 protocol on which other protocols like TCP and UDP communicate.
B. Enables the IPSec protocol on internal workstations.
C. Packet-based detection and prevention of network attacks.
D. Single mode IP communication for a fiber line between remote sites.
第9题:
Which of the following IOS features can prevent IP spoofing attacks?()
第10题:
Observe the following options carefully, which two attacks focus on RSA? ()