电子文档交易市场
安卓APP | ios版本
电子文档交易市场
安卓APP | ios版本

思科网络工程师题库1

80页
  • 卖家[上传人]:凉****
  • 文档编号:325465236
  • 上传时间:2022-07-18
  • 文档格式:DOCX
  • 文档大小:785.96KB
  • / 80 举报 版权申诉 马上下载
  • 文本预览
  • 下载提示
  • 常见问题
    • 1、CCNP/CCIE SecuritySCOR思科网络工程师题库1Q1.In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A. SmurfB. distributed denial of serviceC. cross-site scriptingD. rootkit exploit Answer: C Explanation:Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. The data is usually gathered in the form of a hyperlink which contains malicious content within it. The user will most likely click on this link from a

      2、nother website, instant message, or simply just reading a web board or email message.Usually the attacker will encode the malicious portion of the link to the site in HEX (or other encoding methods) so the request is less suspicious looking to the user when clicked on. For example the code below is written in hex:Click Hereis equivalent to:Click HereNote: In the format &#xhhhh, hhhh is the code point in hexadecimal form.Q2.Which flaw does an attacker leverage when exploiting SQL injection vulner

      3、abilities?A. user input validation in a web page or web applicationB. Linux and Windows operating systemsC. databaseD. web page images Answer: A Explanation:SQL injection usually occurs when you ask a user for input, like their username/userid, but the user gives (injects) you an SQL statement that you will unknowingly run on your database. For example:Look at the following example, which creates a SELECT statement by adding a variable (txtUserId) to a select string.The variable is fetched from

      4、user input (getRequestString):txtUserId = getRequestString(UserId);txtSQL = SELECT * FROM Users WHERE UserId = + txtUserId; If user enter something like this: 100 OR 1=1 then the SQL statement will look like this:SELECT * FROM Users WHERE UserId = 100 OR 1=1;The SQL above is valid and will return ALL rows from the Users table, since OR 1=1 is always TRUE. A hacker might get access to all the user names and passwords in this database.Q3.Which two prevention techniques are used to mitigate SQL inj

      5、ection attacks? (Choose two)A. Check integer, float, or Boolean string parameters to ensure accurate values.B. Use prepared statements and parameterized queries.C. Secure the connection between the web and the app tier.D. Write SQL code instead of using object-relational mapping libraries.E. Block SQL code execution in the web application database login. Answer: ABQ4.Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose

      6、 two)A. Patch for cross-site scripting.B. Perform backups to the private cloud.C. Protect against input validation and character escapes in the endpoint.D. Install a spam and virus email filter.E. Protect systems with an up-to-date antimalware program. Answer: DEExplanation:Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login information,

      7、 or to install malware on the victims machine.Q5.Which two mechanisms are used to control phishing attacks? (Choose two)A. Enable browser alerts for fraudulent websites.B. Define security group memberships.C. Revoke expired CRL of the websites.D. Use antispyware software.E. Implement email filtering techniques. Answer: AEQ6.Which two behavioral patterns characterize a ping of death attack? (Choose two)A. The attack is fragmented into groups of 16 octets before transmission.B. The attack is fragm

      8、ented into groups of 8 octets before transmission.C. Short synchronized bursts of traffic are used to disrupt TCP connections.D. Malformed packets are used to crash systems.E. Publicly accessible DNS servers are typically used to execute the attack. Answer: BDExplanation:Ping of Death (PoD) is a type of Denial of Service (DoS) attack in which an attacker attempts to crash, destabilize, or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping comman

      9、d.A correctly-formed ping packet is typically 56 bytes in size, or 64 bytes when the ICMP header is considered, and 84 including Internet Protocol version 4 header. However, any IPv4 packet (including pings) may be as large as 65,535 bytes. Some computer systems were never designed to properly handle a ping packet larger than the maximum packet size because it violates the Internet Protocol documented Like other large but well-formed packets, a ping of death is fragmented into groups of 8 octets before transmission. However, when the target computer reassembles the malformed packet, a buff

      《思科网络工程师题库1》由会员凉****分享,可在线阅读,更多相关《思科网络工程师题库1》请在金锄头文库上搜索。

      点击阅读更多内容
    最新标签
    信息化课堂中的合作学习结业作业七年级语文 发车时刻表 长途客运 入党志愿书填写模板精品 庆祝建党101周年多体裁诗歌朗诵素材汇编10篇唯一微庆祝 智能家居系统本科论文 心得感悟 雁楠中学 20230513224122 2022 公安主题党日 部编版四年级第三单元综合性学习课件 机关事务中心2022年全面依法治区工作总结及来年工作安排 入党积极分子自我推荐 世界水日ppt 关于构建更高水平的全民健身公共服务体系的意见 空气单元分析 哈里德课件 2022年乡村振兴驻村工作计划 空气教材分析 五年级下册科学教材分析 退役军人事务局季度工作总结 集装箱房合同 2021年财务报表 2022年继续教育公需课 2022年公需课 2022年日历每月一张 名词性从句在写作中的应用 局域网技术与局域网组建 施工网格 薪资体系 运维实施方案 硫酸安全技术 柔韧训练 既有居住建筑节能改造技术规程 建筑工地疫情防控 大型工程技术风险 磷酸二氢钾 2022年小学三年级语文下册教学总结例文 少儿美术-小花 2022年环保倡议书模板六篇 2022年监理辞职报告精选 2022年畅想未来记叙文精品 企业信息化建设与管理课程实验指导书范本 草房子读后感-第1篇 小数乘整数教学PPT课件人教版五年级数学上册 2022年教师个人工作计划范本-工作计划 国学小名士经典诵读电视大赛观后感诵读经典传承美德 医疗质量管理制度 2 2022年小学体育教师学期工作总结
    关于金锄头网 - 版权申诉 - 免责声明 - 诚邀英才 - 联系我们
    手机版 | 川公网安备 51140202000112号 | 经营许可证(蜀ICP备13022795号)
    ©2008-2016 by Sichuan Goldhoe Inc. All Rights Reserved.