单项选择题
Hardware networking devices operate within the protocol stack just like protocols them-selves.Thus,hardware networking devices can be associated with an OSI model layerrelated to the protocols they manage or control.At which layer of the OSI model does arouter operate?()
A.Network layer
B.Layer 1
C.Transport layer
D.Layer 5
点击查看答案&解析
相关考题
-
单项选择题
Unfortunately,attackers have many options of attacks to perform against their targets. Which of the following is considered a denial-of-service (DoS)attack?()
A.Pretending to be a technical manager over the phone and asking a receptionist to change their password
B.While surfing the web,sending to a web server a malformed URL that causes the system to consume 100 percent of the CPU
C.Intercepting network traffic by copying the packets as they pass through a specific subnet
D.Sending message packets to a recipient who did not request them,simply to be annoying -
单项选择题
Some adversaries use DoS attacks as their primary weapon to harm targets,whereas othersmay use them as weapons of last resort when all other attempts to intrude on a target fail. Which of the following is most likely to detect DoS attacks?()
A.Host-based IDS
B.Network-based IDS
C.Vulnerability scanner
D.Penetration testing -
单项选择题
Which of the following types of access control seeks to discover evidence of unwanted,unau-thorized,or illicit behavior or activity?()
A.Preventive
B.Deterrent
C.Detective
D.Corrective
