题目内容 (请给出正确答案)
[主观题]

Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()

A.denial of service

B.brute force

C.reconnaissance

D.Trojan horse

查看答案
如搜索结果不匹配,请 联系老师 获取答案
您可能会需要:
您的账号:,可能会需要:
您的账号:
发送账号密码至手机
发送
更多“Which type of attack is charac…”相关的问题

第1题

Which type of attack uses a simple or complex program that self-replicates and/or depo

A.Dictionary attack

B.Hijacking attack

C.Illicit server attack

D.Virus attack

点击查看答案

第2题

Which type of attack utilizes an unauthorized service or daemon running on your system

A.Virus attack

B.Hijacking attack

C.Man-in-the-middle attack

D.Illicit server attack

点击查看答案

第3题

Which type of attack uses a database or databases to guess a password in order to gain

A.Hijacking attack

B.Virus attack

C.Dictionary attack

D.Man-in-the-middle attack

点击查看答案

第4题

Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server()。

A.denial of service

B.brute force

C.reconnaissance

D.Trojan horse

点击查看答案

第5题

Which type of attack occurs when a hacker obtains passwords and other information from

A.Man-in-the-middle attack

B.Denial-of-service attack

C.Dictionary attack

D.Illicit server attack

点击查看答案

第6题

Which type of attack causes a remote host to crash because it cannot respond to any ne

A.Crack attack

B.Smurf attack

C.SYN flood

D.ICMP flood

点击查看答案

第7题

Which type of attack can use a worm or packet sniffer to crash systems, causing low re

A.Denial-of-service attack

B.Illicit server attack

C.Man-in-the-middle attack

D.Virus attack

点击查看答案

第8题

A hacker has just changed the information for a zone during a zone transfer.This attac

A.Which type of server is the target in such an attack?()

B.An e-mail server

C.A DNS server

D.A router

E.A FTP server

点击查看答案

第9题

A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()

A. It enables an attacker to perform an IP sweep of devices.

B. It enables a hacker to know which operating system the system is running.

C. It can overflow the session table to its limit, which can result in rejection of legitimate traffic.

D. It creates a ping of death and can cause the entire network to be infected with a virus.

点击查看答案

第10题

Lucy obtains the latest stable versions of server, services or applications.Which type

A.Dictionary attack

B.Buffer overflow attack

C.Trojan attack

D.Illicit server attack

点击查看答案
发送账号至手机
获取验证码
发送
温馨提示
该问题答案仅针对搜题卡用户开放,请点击购买搜题卡。
马上购买搜题卡
我已购买搜题卡, 登录账号 继续查看答案
重置密码
确认修改
温馨提示
每个试题只能免费做一次,如需多次做题,请购买搜题卡
立即购买
稍后再说
警告:系统检测到您的账号存在安全风险

为了保护您的账号安全,请在“赏学吧”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!

微信搜一搜
赏学吧
点击打开微信
警告:系统检测到您的账号存在安全风险
抱歉,您的账号因涉嫌违反赏学吧购买须知被冻结。您可在“赏学吧”微信公众号中的“官网服务”-“账号解封申请”申请解封,或联系客服
微信搜一搜
赏学吧
点击打开微信