CompTIA认证考试

Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?()A、DoSB、SmurfC、Man-in-the-middleD、Phishing

题目

Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?()

  • A、DoS
  • B、Smurf
  • C、Man-in-the-middle
  • D、Phishing
如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()

A.Update antivirus definitions

B.MAC filtering

C.Effective security policies

D.User awareness training


参考答案:D

第2题:

A customer wants to check whether they have the necessary tools enabled to prevent intrusions andvirus attacks on a Windows Vista workstation. Which of the following tools can be used to display thecurrent configuration? ()

  • A、Security Center
  • B、Event Viewer Security log
  • C、Windows Defender
  • D、Windows Firewall

正确答案:A

第3题:

Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()

A. Honeynet

B. Honeypot

C. Vulnerability scanner

D. Network based IDS


参考答案:A

第4题:

Birthday attacks are used against which of the following?()

  • A、 digital signatures
  • B、 symmetric ciphering
  • C、 hashalgoritms
  • D、 asymmetric ciphering
  • E、 digital certificates

正确答案:C

第5题:

Which two statements about common network attacks are true?()

  • A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.
  • B、Access attacks can consist of password attacks,ping sweeps,port scans,and man-in-the-middle attacks.
  • C、Access attacks can consist of packet sniffers,ping sweeps,port scans,and man-in-the-middle attacks.
  • D、Reconnaissance attacks can consist of password attacks,trust exploitation,port redirection and Internet information queries.
  • E、Reconnaissance attacks can consist of packet sniffers,port scans,ping sweeps,and Internet information queries.
  • F、Reconnaissance attacks can consist of ping sweeps,port scans,man-in-middle attacks and Internet information queries.

正确答案:A,E

第6题:

Which of the following is NOT true of security attacks?

[A] Employees will keep up with security polices and awareness if they are highly-trained.

[B] The rate of security attacks appears faster than the growth of the Internet.

[C] One's computer system will never be secure.

[D] Vulnerabilities can go through phones, wireless devices, and network appliances


正确答案:A
依据是"Employees will never keep up with security polices and awareness. It doesn't matter how much you train and educate your employees.

第7题:

You are responsible for increasing the security within the Company LAN. Of the following choices  listed below,  which is true regarding layer 2 security and mitigation techniques? ()

  • A、 Enable root guard to mitigate ARP address spoofing attacks.
  • B、 Configure DHCP spoofing to mitigate ARP address spoofing attacks.
  • C、 Configure PVLANs to mitigate MAC address flooding attacks.
  • D、 Enable root guard to mitigate DHCP spoofing attacks.
  • E、 Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted  ports.
  • F、 Configure port security to mitigate MAC address flooding  
  • G、 None of the other alternatives apply

正确答案:F

第8题:

A network IPS provides which of the following?()

A. The layer 3 protocol on which other protocols like TCP and UDP communicate.

B. Enables the IPSec protocol on internal workstations.

C. Packet-based detection and prevention of network attacks.

D. Single mode IP communication for a fiber line between remote sites.


参考答案:C

第9题:

Which of the following IOS features can prevent IP spoofing attacks?()

  • A、PPP over Ethernet
  • B、Cisco Express forwarding
  • C、MPLS traffic Engineering
  • D、IS-IS routing
  • E、Unicast Reverse Path Forwarding(uRPF)

正确答案:E

第10题:

Observe the following options carefully, which two attacks focus on RSA? ()

  • A、BPA attack
  • B、Adaptive chosen ciphertext attack
  • C、DDoS attack
  • D、Man-in-the-middle attack

正确答案:A,B

更多相关问题