niusouti.com
更多“单选题Which of the following would an attacker use to footprint a system?()A RADIUSB Password crackerC Port scannerD Man-in-the-middle attack”相关问题
  • 第1题:

    A technician needs to manage a switch by using the management port on the back of the switch.Which of the following cables would the technician use?()

    • A、Straight
    • B、Console
    • C、Crossover
    • D、Loopback

    正确答案:B

  • 第2题:

    Which of the following commands would a system administrator use to automate monitoring and notification of filling filesystems ()

    • A、startcondresp
    • B、filemon
    • C、lsfs
    • D、mount

    正确答案:A

  • 第3题:

    Which two statements about common network attacks are true?()

    • A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.
    • B、Access attacks can consist of password attacks,ping sweeps,port scans,and man-in-the-middle attacks.
    • C、Access attacks can consist of packet sniffers,ping sweeps,port scans,and man-in-the-middle attacks.
    • D、Reconnaissance attacks can consist of password attacks,trust exploitation,port redirection and Internet information queries.
    • E、Reconnaissance attacks can consist of packet sniffers,port scans,ping sweeps,and Internet information queries.
    • F、Reconnaissance attacks can consist of ping sweeps,port scans,man-in-middle attacks and Internet information queries.

    正确答案:A,E

  • 第4题:

    Which of the following would an attacker use to footprint a system?()

    • A、RADIUS
    • B、Password cracker
    • C、Port scanner
    • D、Man-in-the-middle attack

    正确答案:C

  • 第5题:

    A user has forgotten their BIOS password on their computer. Which of the following would atechnician use to allow the user access to their PC?()

    • A、Remove the BIOS chip on the PC
    • B、Re-flash the BIOS
    • C、Run password cracking software on the users PC
    • D、Set the password clear jumper on the motherboard

    正确答案:D

  • 第6题:

    Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()

    • A、Honeynet
    • B、Honeypot
    • C、Vulnerability scanner
    • D、Network based IDS

    正确答案:A

  • 第7题:

    Which of the following commands would a system administrator use to initiate a rescan of the /etc/inittab file()

    • A、telinit -q
    • B、init -r
    • C、initab -s
    • D、exec /etc/inittab

    正确答案:A

  • 第8题:

    An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()

    • A、DoS
    • B、SYN flood
    • C、port scanning
    • D、IP address sweep

    正确答案:C

  • 第9题:

    单选题
    An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()
    A

    DoS

    B

    SYN flood

    C

    port scanning

    D

    IP address sweep


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    Which of the following commands would a system administrator use to automate monitoring and notification of filling filesystems ()
    A

    startcondresp

    B

    filemon

    C

    lsfs

    D

    mount


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()
    A

    User ID/password file

    B

    Communications layer

    C

    Client applications

    D

    Operating system


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    A user has forgotten their BIOS password on their computer. Which of the following would atechnician use to allow the user access to their PC?()
    A

    Remove the BIOS chip on the PC

    B

    Re-flash the BIOS

    C

    Run password cracking software on the users PC

    D

    Set the password clear jumper on the motherboard


    正确答案: B
    解析: 暂无解析

  • 第13题:

    Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()

    • A、Network layer firewall
    • B、Stateful inspection firewall
    • C、Zone aware firewall
    • D、Application layer firewall

    正确答案:D

  • 第14题:

    Which of the following monitors a server to see which protocols might be in use?()

    • A、Ping sweep
    • B、Intrusion detection software
    • C、Port scanner
    • D、Wireless packet sniffer

    正确答案:B

  • 第15题:

    Observe the following options carefully, which two attacks focus on RSA? ()

    • A、BPA attack
    • B、Adaptive chosen ciphertext attack
    • C、DDoS attack
    • D、Man-in-the-middle attack

    正确答案:A,B

  • 第16题:

    Which of the following locations would a technician use to add a Windows 7 computer to adomain?()

    • A、System Properties
    • B、Windows Defender
    • C、Network and Sharing Center
    • D、Device Manager

    正确答案:A

  • 第17题:

    Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()

    • A、Protocol analyzer
    • B、Vulnerability scanner
    • C、Port scanner
    • D、Penetration test

    正确答案:B

  • 第18题:

    A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()

    • A、User ID/password file
    • B、Communications layer
    • C、Client applications
    • D、Operating system

    正确答案:D

  • 第19题:

    Which of the following commands would an administrator use to add startup scripts to the system startup process()

    • A、chitab
    • B、vi /etc/inittab
    • C、vi /etc/rc.d
    • D、mkitab

    正确答案:D

  • 第20题:

    单选题
    Which of the following commands would a system administrator use to initiate a rescan of the /etc/inittab file()
    A

    telinit -q

    B

    init -r

    C

    initab -s

    D

    exec /etc/inittab


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following commands would an administrator use to add startup scripts to the system startup process()
    A

    chitab

    B

    vi /etc/inittab

    C

    vi /etc/rc.d

    D

    mkitab


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    A technician needs to manage a switch by using the management port on the back of the switch.Which of the following cables would the technician use?()
    A

    Straight

    B

    Console

    C

    Crossover

    D

    Loopback


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()
    A

    Network layer firewall

    B

    Stateful inspection firewall

    C

    Zone aware firewall

    D

    Application layer firewall


    正确答案: A
    解析: 暂无解析