RADIUS
Password cracker
Port scanner
Man-in-the-middle attack
Which of the following monitors a server to see which protocols might be in use?()A、Ping sweepB、Intrusion detection softwareC、Port scannerD、Wireless packet sniffer
点击查看答案
Which two statements about common network attacks are true?()A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.B、Access attacks can consist of password attacks,ping sweeps,port scans,and man-in-the-middle attacks.C、Access attacks can consist of packet sniffers,ping sweeps,port scans,and man-in-the-middle attacks.D、Reconnaissance attacks can consist of password attacks,trust exploitation,port redirection and Internet information queries.E、Reconnaissance attacks can consist of packet sniffers,port scans,ping sweeps,and Internet information queries.F、Reconnaissance attacks can consist of ping sweeps,port scans,man-in-middle attacks and Internet information queries.
Observe the following options carefully, which two attacks focus on RSA? ()A、BPA attackB、Adaptive chosen ciphertext attackC、DDoS attackD、Man-in-the-middle attack
Which of the following would an attacker use to footprint a system?()A、RADIUSB、Password crackerC、Port scannerD、Man-in-the-middle attack
Which of the following locations would a technician use to add a Windows 7 computer to adomain?()A、System PropertiesB、Windows DefenderC、Network and Sharing CenterD、Device Manager
A user has forgotten their BIOS password on their computer. Which of the following would atechnician use to allow the user access to their PC?()A、Remove the BIOS chip on the PCB、Re-flash the BIOSC、Run password cracking software on the users PCD、Set the password clear jumper on the motherboard
Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()A、Protocol analyzerB、Vulnerability scannerC、Port scannerD、Penetration test