-
A network administrator wants to detect a login attack against a router. What IOS command can make the attack recorded in syslog server?()
A . Logging detect fail-login
B . Login on-failure log
C . Login detect login-failure log
D . Logging login on-failure
E . none of the above
-
In the event that two devices need access to a common server, but they cannot communicate witheach other, which security feature should be configured to mitigate attacks between thesedevices?()
A . private VLANs
B . port security
C . BPDU guard
D . dynamic ARP inspection
E . DHCP snooping
-
You are implementing a Web page that displays text that was typed by a user. You need to display the user input in the Web page so that a cross-site scripting attack will be prevented. What should you do?()
A . Call document.write.
B . Call Response.Write.
C . Call HttpUtility.UrlEncode.
D . Call HttpUtility.HtmlEncode.
-
How would you characterize the source and type in a denial of service attack on a router?()
A . By perfornubg a show ip interface to see the type and source of the attack based upon the access-listmatches
B . By performing a show interface to see the transmitted load "txload" and receive load "rxload" ;if the interface utilization is not maxed out ,there is no attack underway
C . By setting up an access-list to permit all ICMP,TCP,and UDP traffic with the log or log-input commands,then use the show access-list and show log commands to determine the type and sourceof attack
D . By applying an access-list to all incoming and outgoing interfaces,turning off route-cache on all interfaces,then,when telnetting into the router perform a debug IP packet detail
-
A(n) () is a mechanical attack on the metal surface which may be due to a disturbance in the flow of the water over the blade of the propeller.
A . erosion
B . corrosion
C . pitting
D . dezincificatio
-
What are the four steps, in their correct order, to mitigate a worm attack?()
A . contain,inoculate,quarantine,and treat
B . inoculate,contain,quarantine,and treat
C . quarantine,contain,inoculate,and treat
D . preparation,identification,traceback,and postmortem
E . preparation,classification,reaction,and treat
F . identification,inoculation,postmortem,and reactio
-
You work as a network technician at Company. Your boss, Mrs. , is interested in switch spoofing. She asks you how an attacker would collect information with VLAN hoping through switch spoofing. You should tell her that the attacking station... ()
A . ...uses VTP to collect VLAN information that is sent out and then tags itself with the domain information in order to capture the data.
B . ...will generate frames with two 802.1Q headers to cause the switch to forward the frames to a VLAN that would be inaccessible to the attacker through legitimate means.
C . ...uses DTP to negotiate trunking with a switch port and captures all traffic that is allowed on the trunk.
D . ...tags itself with all usable VLANs to capture data that is passed through the switch, regardless of the VLAN to which the data belongs.
E . None of the other alternatives apply
-
In which word is “w” a silent letter?
-
was a member of apeople from Scandinavia who attacked parts of northern and western Europe,including Britain and Ireland, in the 8th to 11th centuries.
-
In which word is “w” a silent letter?
-
I don’t like the idea of camping in the wild, because I’m always worried to be attacked by a(n) _____ (昆虫) or animal.
-
In a country that defines itself by ideals, not by shared blood, who should be allowed to come, work and live here? In the wake of the Sept. 11 attacks these questions have seemed more pressing.
On Dec. 11, 2001, as part of the effort to increase homeland security, federal and local authorities in 14 states staged "Operation Safe Travel "--raids on airports to arrest employees with false identification(身份证明). In Salt Lake City there were 69 arrests. But those captured were anything but terrorists, most of them illegal immigrants from Central or South America. Authorities said the undocumented workers' illegal status made them open to blackmail(讹诈)by terrorists.
Many immigrants in Salt Lake City were angered by the arrests and said they felt as if they were being treated like disposable goods.
Mayor Anderson said those feelings were justified to a certain extent. "We're saying we want you to work in these places, we're going to look the other way in terms of what our laws are and then when it's convenient for us, or when we can try to make a point in terms of national security, especially after Sept. 11, then you're disposable. There are whole families being uprooted for all of the wrong reasons," Anderson said.
If Sept, 11 had never happened, the airport workers would not have been arrested and could have gone on quietly living in America, probably indefinitely. Ana Castro, a manager at a Ben & Jerry's ice cream shop at the airport, had been working 10 years with the same false Social Security card when she was arrested in the December airport raid. Now she and her family are living under the threat of deportation(驱逐出境). Castro's case is currently waiting to be settled. While she awaits the outcome, the government has granted her permission to work here and she has returned to her job at Ben & Jerry's.
According to the author, the United States claims to be a nation ______.
A.composed of people having different values
B.encouraging individual pursuits
C.sharing common interests
D.founded on shared ideals
-
听力原文:W: Many Chinese students just don't open their mouth to say anything in a classroom.
M: I think they don't speak because their culture values modesty, and they don't want to appear to be showing off. Goes back to Confucius.
Q: Why don't Chinese students say anything in class according to the man?
(14)
A.They are too shy.
B.They are not allowed to speak.
C.They are modest.
D.They don't dare to speak.
-
听力原文:A United Nations report says sub-Saharan Africa is the only region in the world w
听力原文: A United Nations report says sub-Saharan Africa is the only region in the world where extreme poverty continues to grow over a recent twenty-year period. In its annual report Tuesday, the UN Industrial Development Organization says forty-seven percent of all people living in sub-Saharan Africa subsist on less than one dollar a day. The group said that figure increased by five percentage points in the years between 1981 and 2001. In contrast, the group said the number of people worldwide living in absolute poverty fell from forty percent to twenty-one percent during that same time.
How many people lived in extreme poverty in sub-Saharan Africa in 1981?
A.37% of all the people there.
B.42% of all the people there.
C.45% of all the people there.
D.47% of all the people there.
-
The building up of fat in the arteries can the flow blood, and a heart attack or stroke.
-
We all stayed down in the ()_____ and waited for his attacking orders.
-
There is a /-/w/ merging in Indian English. When Indian people say the word “vine”, it sounds like “wine”.()
此题为判断题(对,错)。
-
How many militants were killed in Wednesday's attacks?
A.10.
B.20.
C.At least 40.
D.At least 60.
-
In the face of recent attacks on the company,Levin_____
A.stuck to a strong stand to defend freedom of expression.
B.softened his tone and introduced a new initiative.
C.yielded to objections and resigned from the company.
D.requested unconditional support from the 15-member board.
-
已知一台三相四极异步电动机的额定数据为PN=10kW,UN=380V,IN=11A,fN=50Hz,电子绕组Y联结,额定运行时,pCu1=500W,pCu2=300W,pFe=200W,pmech=50W,p△=150W。试求:
已知一台三相四极异步电动机的额定数据为P<sub>N</sub>=10kW,U<sub>N</sub>=380V,I<sub>N</sub>=11A,f<sub>N</sub>=50Hz,电子绕组Y联结,额定运行时,p<sub>Cu1</sub>=500W,p<sub>Cu2</sub>=300W,p<sub>Fe</sub>=200W,p<sub>mech</sub>=50W,p<sub>△</sub>=150W。试求:
(1)额定转速;(2)电磁转矩;(3)空载转矩;(4)电动机轴上的输出转矩。
-
听力原文:W: Fm learning a lot in my philosophy class. Have you ever taken any courses in that department?
M: Only the one last year, none since then.
Q: What does the man mean?
(16)
A.He couldn't make any sense out of his course.
B.He hasn't taken more then one philosophy course.
C.He is a philosophy major.
D.He hasn't taken any philosophy course in that department.
-
Surfing is a thrilling and dangerous activity in w...
Surfing is a thrilling and dangerous activity in which a person
balances on a board and rides the surface of a big, crash ocean wave. 【S1 ______.
Channel surfing is a bit different. In this activity a person sits on a couch
and pushes the button of a television remote-control devices many times a
minute check and recheck all the channels. In the United States, channel 【S2】______.
surfing is by far the more popular sport. When television first replaced
radio, in the 1950s. channel surfing was known. Back then, there were 【S3】______.
only a few stations. Viewers had their favorite shows and watched it 【S4】______.
devotedly all the way through. In fact, studies showed that when a family
sat down to watch a favorite program at 7 p. m. , they stayed with the
same channel rest of the evening. With the coming of the cable television. 【S5】______.
dozens of channels now offer a great variety of featured films, situation 【S6】______.
comedies, news, weather, talk, science shows, documentaries, and
advertising. Facing with so many choices, viewers often become quiet and 【S7】______.
feel a need to check, in all the other stations. 【S8】______.
Some studies show that men m a unique U.S. household usually want 【S9】______.
to hold the remote control and surf the channel: women usually like to
choose one program and watch through. 【S10】______.
【S1】
-
There she spent her days in a bare, gray-walled room lined ()where the orphans kept w
There she spent her days in a bare, gray-walled room lined ()where the orphans kept whatever playthings they had.
A、by
B、with
C、for
D、over
-
Which type of attack uses a database or databases to guess a password in order to gain
A.Hijacking attack
B.Virus attack
C.Dictionary attack
D.Man-in-the-middle attack