cisco网络安全答案1

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

1.Whatisapingsweep?ApingsweepisanetworkscanningtechniquethatindicatesthelivehostsinarangeofIPaddresses.ApingsweepisasoftwareapplicationthatenablesthecaptureofallnetworkpacketssentacrossaLAN.ApingsweepisascanningtechniquethatexaminesarangeofTCPorUDPportnumbersonahosttodetectlisteningservices.Apingsweepisaqueryandresponseprotocolthatidentifiesinformationaboutadomain,includingtheaddressesassignedtothatdomain.ObservableDescriptionMaxValueEarnedValue1correctnessofresponse2pointsforOption10pointsforanyotheroption222Whichaccessattackmethodinvolvesasoftwareprogramattemptingtodiscoverasystempasswordbyusinganelectronicdictionary?bufferoverflowattackportredirectionattackDenialofServiceattackbrute-forceattackIPspoofingattackpacketsnifferattackObservableDescriptionMaxValueEarnedValue1correctnessofresponse2pointsforOption40pointsforanyotheroption203HowisaSmurfattackconducted?bysendingalargenumberofpackets,overflowingtheallocatedbuffermemoryofthetargetdevicebysendinganechorequestinanIPpacketlargerthanthemaximumpacketsizeof65,535bytesbysendingalargenumberofICMPrequeststodirectedbroadcastaddressesfromaspoofedsourceaddressonthesamenetworkbysendingalargenumberofTCPSYNpacketstoatargetdevicefromaspoofedsourceaddressObservableDescriptionMaxValueEarnedValue1correctnessofresponse2pointsforOption30pointsforanyotheroption224Aportscanisclassifiedaswhattypeofattack?accessattackDenialofServiceattackreconnaissanceattackspoofingattackObservableDescriptionMaxValueEarnedValue1correctnessofresponse2pointsforOption30pointsforanyotheroption205Whatarethebasicphasesofattackthatcanbeusedbyavirusorworminsequentialorder?paralyze,probe,penetrate,persist,andpropagateprobe,penetrate,persist,propagate,andparalyzepenetrate,persist,propagate,paralyze,andprobepersist,propagate,paralyze,probe,andpenetrateObservableDescriptionMaxValueEarnedValue1correctnessofresponse2pointsforOption20pointsforanyotheroption206Whatarethethreemajorcomponentsofawormattack?(Choosethree.)enablingvulnerabilityinfectingvulnerabilitypayloadpenetrationmechanismprobingmechanismpropagationmechanismObservableDescriptionMaxValueEarnedValue1correctnessofresponseOption1,Option3,andOption6arecorrect.1pointforeachcorrectoption.0pointsifmoreoptionsareselectedthanrequired.317WhichtypeofsoftwaretypicallyusesanetworkadaptercardinpromiscuousmodetocaptureallnetworkpacketsthataresentacrossaLAN?portscannerpingsweeperpacketsnifferInternetinformationqueryObservableDescriptionMaxValueEarnedValue1correctnessofresponse2pointsforOption30pointsforanyotheroption208Anattackerisusingalaptopasarogueaccesspointtocaptureallnetworktrafficfromatargeteduser.Whichtypeofattackisthis?trustexploitationbufferoverflowmaninthemiddleportredirectionObservableDescriptionMaxValueEarnedValue1correctnessofresponse2pointsforOption30pointsforanyotheroption209Whichthreeoptionsdescribethephasesofwormmitigation?(Choosethree.)ThecontainmentphaserequirestheuseofincomingandoutgoingACLsonroutersandfirewalls.Thecontainmentphasetracksdownandidentifiestheinfectedmachineswithinthecontainedareas.Theinoculationphasedisconnects,blocks,orremovesinfectedmachines.Theinoculationphasepatchesuninfectedsystemswiththeappropriatevendorpatchforthevulnerability.Thequarantinephaseterminatesthewormprocess,removesmodifiedfilesorsystemsettings,andpatchesthevulnerabilitythewormusedtoexploitthesystem.Thetreatmentphasedisinfectsactivelyinfectedsystems.ObservableDescriptionMaxValueEarnedValue1correctnessofresponseOption1,Option4,andOption6arecorrect.1pointforeachcorrectoption.0pointsifmoreoptionsareselectedthanrequired.3110Whichphaseofwormmitigationrequirescompartmentalizationandsegmentationofthenetworktoslowdownorstopthewormandpreventcurrentlyinfectedhostsfromtargetingandinfectingothersystems?containmentphaseinoculationphasequarantinephasetreatmentphaseObservableDescriptionMaxValueEarnedValue1correctnessofresponse2pointsforOption10pointsforanyotheroption2011WhatisacharacteristicofaTrojanHorse?ATrojanHorsecanbecarriedinavirusorworm.AproxyTrojanHorseopensport21onthetargetsystem.AnFTPTrojanHorsestopsanti-virusprogramsorfirewallsfromfunctioning.ATrojanHorsecanbehardtodetectbecauseitcloseswhentheapplicationthatlauncheditcloses.ObservableDescriptionMaxValue1correctnessofresponse2pointsforOption10pointsforanyotheroption212Whichtwostatementsarecharacteristicsofavirus?(Choosetwo.)Avirustypicallyrequiresend-useractivation.Avirushasanenablingvulnerability,apropagationmechanism,andapayload.Avirusreplicatesitselfbyindependentlyexploitingvulnerabilitiesinnetworks.Avirusprovidestheattackerwithsensitivedata,suchaspasswords.Aviruscanbedormantandthenactivateataspecifictimeordate.ObservableDescriptionMaxValueEarnedValue1correctnessofresponseOption1andOption5arecorrect.1pointforeachcorrectoption.0pointsifmoreoptionsareselectedthanrequired.2013WhichtwoarecharacteristicsofDoSattacks?(Choosetwo.)Theyalwaysprecedeaccessattacks.Theyattempttocompromisetheavailabilityofanetwork,host,orapplication.Theyaredifficulttoconductandareinitiatedonlybyveryskilledattackers.Theyarecommonlylaunched

1 / 11
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功