【简答题】A computer virus is a computer program that is created to make and spread copies of itself. The program may however also be designed to have other effects on the systems it infects, ranging from the a...
【判断题】大多数部署的 IDS 主要是基于特征的 IDS 。
【简答题】在定向井设计中,油层部位的井身应尽量设计成 ,或使井斜角尽可能的 ,以利于封隔器的坐封,利于改善抽油杆的工作条件和将来修井作业的顺利进行。
【多选题】The Company security administrator is concerned with VLAN hopping based attacks. Which two statements about these attacks are true? ()
A.
Attacks are prevented by utilizing the port-security feature.
B.
An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the 802.1q encapsulation.
C.
Configuring an interface with the switchport mode dynamic command will prevent VLAN hopping.
D.
An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q encapsulation.
E.
Configuring an interface with the "switchport mode access" command will prevent VLAN hopping.
【单选题】These attacks are a major _______ to the establishment of a peaceful settlement of the conflict.
【单选题】下列函数中,可以用于创建等差数组的函数是( )。
【多选题】The Company security administrator is concerned with layer 2 network attacks. Which two statements about these attacks are true? ()
A.
ARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.
B.
ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP message with a forged identity to a transmitting host.
C.
MAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.
D.
ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP packet that contains the forged address of the next hop router.
E.
MAC address flooding is an attempt to redirect traffic to a single port by associating that port with all MAC addresses in the VLAN.
【单选题】In a Bridged 1483 network, an ISP has received complaints from their subscribers of denial of service attacks. The ISP suspects these attacks are coming from other subscribers that share the same IP u...