CMS专题

单选题A Denial of Service (DoS) attack is:()A an attempt to bring down a website or other online service.B a prank where someone sends an unauthorized e-mail attempting to close a user’s e-mail account.C stealing a user’s identity and making changes to their

题目
单选题
A Denial of Service (DoS) attack is:()
A

an attempt to bring down a website or other online service.

B

a prank where someone sends an unauthorized e-mail attempting to close a user’s e-mail account.

C

stealing a user’s identity and making changes to their accounts.

D

an attempt to change a user’s password to prevent access to a service by repeatedly guessing the user’s information.

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A service provider wants to prevent the repeat of a denial of service (DoS) attack that recently disabled Internet access for several thousand customers. Which Cisco solution best matches this business need?()

A.Network security

B.Virtual Private Network (VPN)

C.Wireless network

D.Content networking


参考答案:A

第2题:

DDos和Dos都属于网络中常见的攻击类型,对此描述不正确的是()

A.SYN Flood.Fraggle都属于Dos攻击

B.DDos(Distributed Denial of Service)攻击是一种Dos攻击。这种攻击是使用攻击者控制的几十台或几百台计算机攻击一台主机,使系统无法接收正常用户的请求,或者挂起不能正常的工作

C.Dos(Distributed Denia lof Service)攻击是一种Dos攻击,这种攻击是使用攻击者控制的几十台或几百台计算机攻击一台主机,使系统无法接受正常的用户请求,或者挂起不能正常的工作

D.Smurf攻击是属于Dos攻击的一种


参考答案:C

第3题:

You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()

A. then reject

B. then discard

C. then next filter

D. then silent-drop


参考答案:B

第4题:

Which software-based security threat is typically spread from user to user via e-mail?()

  • A、Data interception
  • B、Virus
  • C、Trojan horse
  • D、Denial of service

正确答案:B

第5题:

什么是DistributedD.O.S(Distributed Denial Of Service)分布式拒绝服务


正确答案: 这是一种黑客攻击的手段。这种攻击的简单原理是:攻击者首先通过一些常用的黑客手段侵入并控制一些肉鸡(客户端主机),通过在这些主机上安装并启动一个进程,使得这些主机听命于攻击者的特殊指令。当攻击者把攻击目标的IP地址作为指令下达给这些进程的时候,这些进程就开始向目标主机发送攻击。这种方式集中了几百台甚至上千台服务器的带宽能力,对单一目标实施攻击,其威力极其巨大,通常会造成其被攻击网络的瘫痪或拒绝对外服务,因此被称为分布式拒绝服务攻击。

第6题:

Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()

A.denial of service

B.brute force

C.reconnaissance

D.Trojan horse


参考答案:A

第7题:

拒绝服务(Denial of Service,DoS)攻击,DoS攻击的目的是使被攻击对象死机,使其不能对合法用户提供正常的服务。


正确答案:错误

第8题:

You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()

A. from source-port

B. from source-address

C. from destination-address

D. from destination-port


参考答案:B

第9题:

What are two benefits of control plane policing?()

  • A、protection against denial of service (DoS) attacks at infrastructure routers and switches
  • B、 protection against known worm attacks in routers and switches
  • C、quality of service (QoS) control for packets that are sourced from the data plane of Cisco routers and switches
  • D、quality of service control (QoS) for packets that are destined to the control plane of Cisco routers and switches
  • E、quality of service (QoS) control for packets that are destined to the data plane of Cisco routers and switches

正确答案:A,D

第10题:

You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()

  • A、from source-port
  • B、from source-address
  • C、from destination-address
  • D、from destination-port

正确答案:B

更多相关问题