【简答题】A computer virus is a computer program that is created to make and spread copies of itself. The program may however also be designed to have other effects on the systems it infects, ranging from the a...
【多选题】The Company security administrator is concerned with VLAN hopping based attacks. Which two statements about these attacks are true? ()
A.
Attacks are prevented by utilizing the port-security feature.
B.
An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the 802.1q encapsulation.
C.
Configuring an interface with the switchport mode dynamic command will prevent VLAN hopping.
D.
An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q encapsulation.
E.
Configuring an interface with the "switchport mode access" command will prevent VLAN hopping.
【单选题】What kind of reasoning is used in the following statement? In recent months, newspapers have carried reports of vicious dogs attacking people in Los Angeles, St. Louis, Boston, and Orlando. These repo...
B.
Reasoning from principle.
C.
Reasoning from specific instances.
【单选题】内部审计部门为测试经营活动内部控制的审计方案应该考虑的内容是:()
A.
审计方案应该全面的审计每一个经营活动,但是又不能重复工作而浪费成本
B.
审计方案应该具有通用性质,以保证每个部门都是适用的
C.
审计方案应该具有通用性质,对于个别的特殊情况是可以忽略的
D.
审计方案应该进行调整,保证在通用的基础上适用于每种经营活动审计
【多选题】The Company security administrator is concerned with layer 2 network attacks. Which two statements about these attacks are true? ()
A.
ARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.
B.
ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP message with a forged identity to a transmitting host.
C.
MAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.
D.
ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP packet that contains the forged address of the next hop router.
E.
MAC address flooding is an attempt to redirect traffic to a single port by associating that port with all MAC addresses in the VLAN.
【单选题】In a Bridged 1483 network, an ISP has received complaints from their subscribers of denial of service attacks. The ISP suspects these attacks are coming from other subscribers that share the same IP u...
【单选题】Most computer systems are(165)to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be(166)to an outsider attack by preventing(167)from outside can still ...
【单选题】_____ l In murders investigated by the FBI, more than one-third have been committed by one family member against anothet. 2 Three percent of them involve the murder of a child by a parent. 3 Aggressio...
A.
Abuse of children by parents is widespread in the United States.
B.
Aggression is part of many marriages in this country.
C.
In the United States, family violence is increasing steadily.
D.
In the United States, aggression is often directed toward members of one's own family.