单项选择题
Unfortunately,attackers have many options of attacks to perform against their targets. Which of the following is considered a denial-of-service (DoS)attack?()
A.Pretending to be a technical manager over the phone and asking a receptionist to change their password
B.While surfing the web,sending to a web server a malformed URL that causes the system to consume 100 percent of the CPU
C.Intercepting network traffic by copying the packets as they pass through a specific subnet
D.Sending message packets to a recipient who did not request them,simply to be annoying
点击查看答案&解析
相关考题
-
单项选择题
Some adversaries use DoS attacks as their primary weapon to harm targets,whereas othersmay use them as weapons of last resort when all other attempts to intrude on a target fail. Which of the following is most likely to detect DoS attacks?()
A.Host-based IDS
B.Network-based IDS
C.Vulnerability scanner
D.Penetration testing -
单项选择题
Which of the following types of access control seeks to discover evidence of unwanted,unau-thorized,or illicit behavior or activity?()
A.Preventive
B.Deterrent
C.Detective
D.Corrective -
单项选择题
Brazil′s Amazon rainforest is()with life that could yield raw materials for new medicines.
A.seeming
B.teeming
C.deeming
D.booming
