A.Asymmetric ciphers use pre-shared keys B.Symmetric ciphers are faster to compute C.Asymmetric ciphers are faster to compute D.Asymmetric ciphers use public and private
单项选择题WhichofthefollowingisthemosteffectivetechniquetopreventsourceIPAddressspoofing?()
A. policy based routing (PBR) B. unicast reverse path forwarding (uRPF) C. lock and keyACL D. RFC 1918filtering E. IP source routing
单项选择题WhichtypeofattackscanbemonitoredandmitigatedbyCS-MARSusingNetFlowdata?()
A. Man-in-themiddle attack B. Spoof attack C. Land.C attack D. Buffer Overflow E. Day zero attack F. Trojan Horse
单项选择题WhichbestrepresentsatypicalattackthattakesadvantageofRFC792,ICMPType3messages?()
A. Blind connection-reset B. Large packet echo request C. Packet fragmentation offset D. Broadcast-based echo request E. Excessive bandwidth consumption
多项选择题CiscoIOSIPSsendsIPSalertmessagesusingwhichtwoprotocols?()
A. SDEE B. LDAP C. SYSLOG D. FTP E. SNMP F. SMTP
多项选择题WhenimplementingWLANsecurity,whatarethreebenefitsofusingtheTemporalKeyIntegrityProtocol(TKIP)insteadofWEP?()
A. TKIP uses an advanced encryption scheme based on AES B. TKIP provides authentication and integrity checking using Cipher Block Chaining Message Authentication Code (CBC-MAC) C. TKIP provides per-packet keyingand a rekeying mechanism D. TKIP provides message integrity check E. TKIP reduces WEP’s vulnerabilities byusing different hardware encryption chipset F. TKIP uses a 48 bit InitializationVector