BR0-001

单选题Which of the following would an attacker use to footprint a system?()A RADIUSB Password crackerC Port scannerD Man-in-the-middle attack

题目
单选题
Which of the following would an attacker use to footprint a system?()
A

RADIUS

B

Password cracker

C

Port scanner

D

Man-in-the-middle attack

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A technician needs to manage a switch by using the management port on the back of the switch.Which of the following cables would the technician use?()

A.Straight

B.Console

C.Crossover

D.Loopback


参考答案:B

第2题:

A technician needs to manage a switch by using the management port on the back of the switch.Which of the following cables would the technician use?()

  • A、Straight
  • B、Console
  • C、Crossover
  • D、Loopback

正确答案:B

第3题:

Which of the following utilities would a technician use to prevent a service from starting duringsystem startup?()

A. Event Viewer

B. System File Checker

C. MSCONFIG

D. Task Manager


参考答案:C

第4题:

Which two statements about common network attacks are true?()

  • A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.
  • B、Access attacks can consist of password attacks,ping sweeps,port scans,and man-in-the-middle attacks.
  • C、Access attacks can consist of packet sniffers,ping sweeps,port scans,and man-in-the-middle attacks.
  • D、Reconnaissance attacks can consist of password attacks,trust exploitation,port redirection and Internet information queries.
  • E、Reconnaissance attacks can consist of packet sniffers,port scans,ping sweeps,and Internet information queries.
  • F、Reconnaissance attacks can consist of ping sweeps,port scans,man-in-middle attacks and Internet information queries.

正确答案:A,E

第5题:

Which of the following commands would a system administrator use to automate monitoring and notification of filling filesystems ()

  • A、startcondresp
  • B、filemon
  • C、lsfs
  • D、mount

正确答案:A

第6题:

Which of the following monitors a server to see which protocols might be in use?()

A. Ping sweep

B. Intrusion detection software

C. Port scanner

D. Wireless packet sniffer


参考答案:B

第7题:

Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()

  • A、Network layer firewall
  • B、Stateful inspection firewall
  • C、Zone aware firewall
  • D、Application layer firewall

正确答案:D

第8题:

A user has forgotten their BIOS password on their computer. Which of the following would atechnician use to allow the user access to their PC?()

A. Remove the BIOS chip on the PC

B. Re-flash the BIOS

C. Run password cracking software on the users PC

D. Set the password clear jumper on the motherboard


参考答案:D

第9题:

Which of the following monitors a server to see which protocols might be in use?()

  • A、Ping sweep
  • B、Intrusion detection software
  • C、Port scanner
  • D、Wireless packet sniffer

正确答案:B

第10题:

Observe the following options carefully, which two attacks focus on RSA? ()

  • A、BPA attack
  • B、Adaptive chosen ciphertext attack
  • C、DDoS attack
  • D、Man-in-the-middle attack

正确答案:A,B

更多相关问题