A.These attacks send multiple FIN segments forcing TCP connection release.
B.These attacks fill up a hosts’ listen queue by failing to ACK partially openedTCPconnections.
C.These attacks take advantage of the hosts transmit backoff algorithm by sending jam signals to the host.
D.These attacks increment the ISN of each segment by a random number causing constant TCP retransmissions.
E.These attacks send TCP RST segments in response toconnection SYN+ACK segments forcing SYN retransmissions.
您可能感興趣的試卷
你可能感興趣的試題
A. An active-x applicationor a java script application
B. A java script application and a PHP application.
C. A fully compiled .NET framework application
D. A fully operational Visual Basic application
E. A java applet running in the context of your browser or a stand alone application using the java run-timeenvironment
A. No vulnerable applications or operating systems
B. No viruses or worms
C. Appropriate security applications and patch levels
D. Current IPS signatures
E. Cisco Security Agent
A. RFC 1769 and mere publications
B. Real standards of RFC 1918
C. RFC 1669 real standards andmere publications
D. Real standards and mere publications RFC 1796
E. None of the above
A. Open mail relays are often used for spamming.
B. ESMTP does NOT provide more security features than SMTP
C. SMTPdoes provide authenticated email sending."
D. Worms often spread via SMTP.
A. 3DES is muchmore secure than DES.
B. Both DES and 3DES are stream ciphers.
C. DES uses 64 bitkeys, although the effective key lengthis only 56bits.
D. The decryption operation for both DES and 3DES is the same as the encryption operation.
E. DES can only be used for encryption, whereas 3DES can also be used for authentication.
A. tunnel source
B. tunnel destination
C. tunnel key
D. ip address
E. tunnelvrf
A. Anomaly Detection
B. SYN Cookies
C. Application Inspection
D. Content filtering
E. Anti-X Protection
F. Anti Virus
A. Class-Based Policing
B. Control Plane Policing
C. Dual-Rate Policier
D. Single-Rate Policier
E. Class-BasedTraffic Shaper
A.Prevents DoS from legimate, non-hostile end systems
B.Prevents disruption of "special services", such as Mobile IP
C.Defeats DoS Attacks which employ IPSource Address Spoofing
D.Restricts directed broadcasts at the ingress router
E.Allows DHCP or BOOTP packets to reach the relay agents asappropriate
A. NAT provides 1 to manyaddress mapping.
B. NAT provides 1 to 1 address mapping.
C. NAT is only useful forTCP/UDP and ICMP traffic.
D. NAT can be used for all IP traffic.
最新試題
CS-MARS works with which IOS feature to accomplish anomaly detection?()
Which statements are true concerning NAT? ()
Which access methods can CS-MARS use toget configuration information from an Adaptive SecurityAppliance (ASA)? ()
What Cisco technology protects against Spanning-Tree Protocol manipulation?()
Select the two correctstatements from the list below that describe DES and 3DES: ()
TACACS+ authentication uses whichthree packet types? ()
Which SSL protocol takes anapplication message tobe transmitted, fragments the datainto manageable blocks, optionally compresses the data, applies a MAC, encrypts, adds a header, and transmits the resulting unit ina TCPsegment?()
In an L2TP voluntary tunneling scenario, the VPDN tunnel is terminated between:()
Which of the following is true about RADIUSV end or Specific Attribute? ()
When implementing internet standards you are required to follow RFC’s processes and procedures based onwhat RFC?()