试题详情
- 多项选择题Which two network attack statements are true?()
A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.
B、Access attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.
C、DoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.
D、DoS attacks can consist of IP spoofing and DDoS attacks.
E、IP spoofing can be reduced through the use of policy-based routing.
F、IP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.
- A,D
关注下方微信公众号,在线模考后查看
热门试题
- What are
- 简述传统的多层交换与基于CEF的多层交换
- Given an IP address
- Which statemen
- IDS和IPS技术使用()部署方式
- Which three
- Which statemen
- What kind of message
- Which command helps
- Refertotheexhibit.Yo
- You work a
- Which commands is ne
- Which VPN̳
- What is the default
- What are
- Which three statemen
- 224.0.0.5代表的是()地址。
- Refertotheexhibit.Wh
- A network engineer w
- Refertotheexhibit.EI