单选题A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()A It enables an attacker to perform an IP sweep of devices.B It enables a hacker to know which operating system th

题目
单选题
A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()
A

It enables an attacker to perform an IP sweep of devices.

B

It enables a hacker to know which operating system the system is running.

C

It can overflow the session table to its limit, which can result in rejection of legitimate traffic.

D

It creates a ping of death and can cause the entire network to be infected with a virus.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

The ‘fsck -p /dev/lv00’command returned thefollowing message: Not a recognized filesystem type What is the likely cause of the problem and how should it be resolved?()

A.The file system superblock is dirty. It can be replaced from the VGDA

B.The logical volume superblock is dirty. It can be replaced from the VGDA

C.The file system superblock is dirty. It can be replaced from the secondary copy

D.The logical volume superblock is dirty. It can be replaced from the secondary copy


参考答案:C

第2题:

An administrator is troubleshooting a problem on an application server, but has not determined the cause of the problem and is not able to replicate the problem. Which of the following should the administrator do prior to escalating the issue?()

  • A、Gather information from users.
  • B、Reboot the server.
  • C、Apply the latest service packs to the operating system.
  • D、Perform a root cause analysis

正确答案:D

第3题:

You create a large, n-tier Web application that has a custom event tracking system. You need to create a custom event type that enables your event tracking system to record all relevant event details for all types of events. The events must be stored in Microsoft SQL Server.From which base type should your custom event type inherit? ()

A. IWebEventCustomEvaluator

B. WebEventProvider

C. WebBaseEvent

D. WebAuditEvent


参考答案:C

第4题:

An administrator is troubleshooting a problem on an application server, but has not determined the cause of the problem and is not able to replicate the problem.  Which of the following should the administrator do prior to escalating the issue?()

  • A、 Gather information from users.
  • B、 Reboot the server.
  • C、 Apply the latest service packs to the operating system.
  • D、 Perform a root cause analysis.

正确答案:A

第5题:

What is the use of an "all configuration" backup in Cisco UCS?()

  • A、 Can be used to migrate from a 6120 to a 6140 and retain the same service profiles
  • B、 Can only be used on the fabric interconnect on which it was created
  • C、 Can be used to migrate from a 6120 to 6140 and retain system IP addresses and cluster information
  • D、 Can be used to match firmware versions between 6120 and 6140 during a migration

正确答案:A

第6题:

The system administrator did a new install of AIX on a server about a week ago. The system was not rebooted after the installation. CDE is running on this system as is TCPIP. The system administrator has started configuring the system percompany directives. The power cable was inadvertently disconnected from the wall causing the sever to lose power. Upon reboot, the system appears to hang during log in from the console or from Xterminals. Which of the following is the most probable cause?()

A.It is a hardware problem caused by the power failure.

B.There is a network problem, most probably with name resolution.

C.Sine the system was never rebooted, devices are marked defined instead of available and need to be activated.

D.Some filesets may be marked as broken and need to be reinstalled.


参考答案:B

第7题:

A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()

  • A、It enables an attacker to perform an IP sweep of devices.
  • B、It enables a hacker to know which operating system the system is running.
  • C、It can overflow the session table to its limit, which can result in rejection of legitimate traffic.
  • D、It creates a ping of death and can cause the entire network to be infected with a virus.

正确答案:C

第8题:

A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()

A. It enables an attacker to perform an IP sweep of devices.

B. It enables a hacker to know which operating system the system is running.

C. It can overflow the session table to its limit, which can result in rejection of legitimate traffic.

D. It creates a ping of death and can cause the entire network to be infected with a virus.


参考答案:C

第9题:

Which of the following will help protect an operating system from vulnerability?()

  • A、Download free anti-virus programs from the Internet.
  • B、Perform updates from the manufacturers website regularly.
  • C、Using the operating systems email program only to open attachments.
  • D、Monitoring what is displayed on the screen.

正确答案:B

第10题:

The ‘fsck -p /dev/lv00’ command returned the following message:Not a recognized filesystem type. What is the likely cause of the problem and how should it be resolved?()

  • A、The file system superblock is dirty. It can be replaced from the VGDA
  • B、The logical volume superblock is dirty. It can be replaced from the VGDA
  • C、The file system superblock is dirty. It can be replaced from the secondary copy
  • D、The logical volume superblock is dirty. It can be replaced from the secondary copy

正确答案:C

更多相关问题