多做题,通过考试没问题!

思科认证考试

睦霖题库>软件认证工程师考试>思科认证考试

Which two network attack statements are true?()

  • A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.
  • B、Access attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.
  • C、DoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.
  • D、DoS attacks can consist of IP spoofing and DDoS attacks.
  • E、IP spoofing can be reduced through the use of policy-based routing.
  • F、IP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.
正确答案:A,D
答案解析:
进入题库查看解析

微信扫一扫手机做题