单项选择题A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()

A.Worm
B.Smurf
C.Logic Bomb
D.Man-in-the-middle


您可能感兴趣的试卷

你可能感兴趣的试题

2.单项选择题An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()

A. Router routes traffic between different networks and a switch does not
B. The new switch is faulty and needs to be replaced and configured correctly
C. The firewall needs to be setup to allow traffic to reach the Internet
D. The switch needs to be setup to forward data traffic to the Internet

7.单项选择题Which of the following DNS record types provides the hostname to IP address mapping?()

A. A record
B. NS record
C. CNAME record
D. MX record

8.单项选择题Which of the following should be updated when new computers are purchased?()

A. Asset management
B. Change management
C. Cable management
D. Baselines

最新试题

An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()

题型:单项选择题

A company has recently received a new ADSL backup Internet connection. Which of the followingwill MOST likely be used between the modem and the ISP?()

题型:单项选择题

Which of the following wireless technologies can support the GREATEST distance on either 2.4GHz or 5GHz frequencies?()

题型:单项选择题

When ordering switches for a new building, which of the following is the BEST way for the technician to determine the number of switches to put in each network closet?()

题型:单项选择题

Which of the following protocols is commonly used for VoIP technology?()

题型:单项选择题

Which of the following wiring standards would MOST likely be used to interconnect two devices without the use of a hub or switch?()

题型:单项选择题

Which of the following DNS record types provides the hostname to IP address mapping?()

题型:单项选择题

A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()

题型:单项选择题

Which of the following is a hybrid network topology used for fault tolerance, in which all computersMUST connect to each other?()

题型:单项选择题

A network technician is concerned about the environmental effects of power consumption and heat from network resources Limited space is also a concern. Which of the following technologies should be implemented?()

题型:单项选择题