【单选题】
不属于远程控制木马进行网络入侵的过程的是?___
A. 传播木马
B. 运行木马
C. 信息建立
D. 建立连接
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
C
解析
暂无解析
相关试题
【单选题】
木马攻击的植入技术主要包括主动植入和被动植入,其中被动植入采用的主要手段是?___
A. 攻击
B. 防御
C. 欺骗
D. 入侵
【单选题】
病毒程序一般由几个模块组成___
A. 1
B. 2
C. 3
D. 4
【单选题】
下列不属于木马防范的方法的是。___
A. 及时修补漏洞,安装补丁
B. 打开不安全网站
C. 运行实时监控程序
D. 培养风险意识
【单选题】
计算机病毒是一种___。
A. 木马
B. 程序
C. 软件
D. 细菌
【单选题】
以下不属于木马程序的自启动方式的是。___
A. 修改系统程序
B. 打开电脑
C. 修改系统注册表
D. 添加系统服务
【单选题】
不属于木马程序隐藏的方式是哪个?___
A. 程序隐藏
B. 进程隐藏
C. 身份隐藏
D. 通信隐藏
【单选题】
DDL隐藏木马的方法之一是动态嵌入技术,其实现方法是___
A. 程序的代码嵌入到正在运行的进程中
B. 将木马程序安装入电脑中
C. 将木马程序通过邮件发送
D. 进行进程欺骗
【单选题】
下列对于Web欺骗的描述,错误的是?___
A. Web欺骗的手段有TCP和DNS欺骗两种
B. Web欺骗是一种电子信息欺骗,攻击者在其中创造了整个Web世界的一个令人信服但是完全错误的拷贝。
C. 攻击者能够监视攻击者的网络信息,但不能记录他们访问的网页和内容
D. 攻击者可以获得用户的账户和密码
【单选题】
以下关于ARP欺骗的描述错误的是?___
A. ARP欺骗是利用ARP协议缺乏信任机制的缺陷的一种欺骗类攻击
B. ARP欺骗可冒充网关欺骗主机
C. 在主机上静态绑定网关的MAC地址可防止所有ARP欺骗
D. ARP欺骗可将用户数据导向不存在的地址
【单选题】
下列关于欺骗类攻击的描述错误的是?___
A. IP欺骗可用于拒绝服务攻击
B. 系统基于IP验证来建立信任关系为IP欺骗带来的可能性
C. DNS欺骗其实就是“黑掉”对方网站,让其显示黑客需要显示的信息
D. DNS欺骗其实就是冒名顶替,招摇撞骗
【单选题】
下列关于Email欺骗的描述错误的是___。
A. Email欺骗指发件人地址是虚假的
B. Email欺骗的前提是发件所用的邮件服务器不验证发件人
C. 直接使用被冒充人的邮件地址发件将无法获得回复邮件
D. 可通过指定回复地址来接收被欺骗者的回复邮件
【单选题】
IP欺骗的核心是获得___。
A. DNS标识ID
B. TCP序号
C. 端口号
D. TCP payload
【单选题】
DNS欺骗的核心是伪造什么?___
A. TCP序列号
B. 端口号
C. DNS标识ID
D. MAC地址
【单选题】
下面哪项不是防范ARP攻击的有效方法?___
A. IP-MAC静态绑定
B. 使用类似port security的功能
C. DHCP Snooping+DAI技术
D. 加强用户权限控制
【单选题】
在进行网络攻击身份隐藏的时候,下列哪一项网络信息不能被欺骗或盗用?___
A. MAC地址
B. IP地址
C. 邮件账户
D. 以上都不是
【单选题】
下列关于电子邮件传输协议描述错误的是。___
A. SMTP协议负责邮件系统如何将邮件从一台计算机传送到另外一台计算机
B. IMAP4的应用比POP3更广泛
C. IMAP4协议能够使用户可以通过浏览远程服务器上的信件,决定是否要下载此邮件
D. POP3协议规定怎样将个人计算机连接到邮件服务器和如何下载电子邮件
【单选题】
TCP/IP协议层次结构由___组成?
A. 网络接口层、网络层组成
B. 网络接口层、传输层组成
C. 网络接口层、网络层、传输层和应用层组成
D. 网络接口层、网络层、应用层组成
【单选题】
假冒网络管理员,骗取用户信任,然后获取密码口令信息的攻击方式被称为___。
A.  密码猜解攻击 
B.  社会工程攻击
C.  缓冲区溢出攻击
D.  网络监听攻击
【单选题】
以下哪些是动态网页技术___
A. CGI
B. ASP
C. JSP
D. 以上都是
【单选题】
以下哪些是植入代码的构造类型___
A. NSR
B. RNS
C. AR
D. 以上都是
【单选题】
以下那些事内存区域连续的内存块___
A. 代码段
B. 数据段
C. 堆栈段
D. 以上都是
【单选题】
以下哪些是缓冲区溢出___
A. 栈溢出
B. 堆溢出
C. BSS溢出
D. 以上都是
【单选题】
常见的Windows NT系统口令破解软件,如L0phtCrack(简称LC),支持以下哪一种破解方式___
A.  字典破解
B.  混合破解 
C.  暴力破解
D.  以上都是
【单选题】
下列哪一种网络欺骗技术是实施交换式(基于交换机的网络环境)嗅探攻击的前提?___
A.  IP欺骗 
B.  DNS欺骗 
C.  ARP欺骗
D.  路由欺骗
【单选题】
在Windows系统中可用来隐藏文件(设置文件的隐藏属性)的命令是____。___
A.  dir 
B.  attrib
C.  ls 
D.   move
【单选题】
Unix系统中的last命令用来搜索____来显示自从文件创建以来曾经登录过的用户,包括登录/退出时间、终端、登录主机IP地址。___ 
A.  utmp/utmpx文件 
B. wtmp/wtmpx文件 
C. lastlog文件 
D.  attc文件 
【单选题】
以下哪些是程序在内存中的存放形式___
A. bss
B. data
C. text
D. 以上都是
【单选题】
下列为计算机网络的传输技术的是。___
A. 点播式
B. 点到点式
C. 传输式
D. 传播式
【单选题】
网卡有四种模式,下列哪一个不是网卡的模式之一___
A. 传播模式
B. 组播模式
C. 直接模式
D. 混杂模式
【单选题】
LibPcap函数库按功能分组,下列属于的是___
A. 打开、读取设备、设置过滤器
B. 优化、调试过滤规则表达式
C. 脱机方式监听
D. 以上都是
【单选题】
下列关于交换网络下,防监听的措施错误的是___
A. 把网络安全网络安全信任关系建立在单一的IP或者MAC基础上
B. 使用静态的ARP或者IP-MAC对应表代替动态的ARP或者IP-MAC对应表,禁止自动更新,使用手动更新
C. 定期检查ARP请求,使用ARP监视工具
D. 不要把网络安全信任关系建立在单一的IP或者MAC基础上
【单选题】
下列关于Wireshark捕获数据包的主要界面分为几个区域?___
A. 1
B. 2
C. 3
D. 4
【单选题】
下列关于Wireshark捕获数据包不正确的是?___
A. 数据包序号指的是被捕获的顺序
B. 时间戳指的是被捕获时相对第一个被捕获的数据包相隔的时间
C. 时间戳指的是数据包包含的时间戳信息
D. 中间区域按协议封装过程显示各层结构对应的内容
【单选题】
交换式局域网在哪几个方面有优势___
A. 技术
B. 速度
C. 安全
D. 以上都是
【单选题】
下列关于数据帧地址正确的是。___
A. 数据帧地址的类型一般不止两种类型
B. 分为两种类型:发往单机的数据帧地址和广播数据帧地址
C. 发往单机的数据帧地址目的是多个的主机的MAC
D. 广播数据帧地址目的是单个主机的MAC
【单选题】
下列关于网络嗅探实验,错误的是___
A. 网络嗅探的能力范围已经适用于广域网
B. 网络嗅探的能力范围目前局限于局域网
C. 网络嗅探技术具有原理简单、易于实现的优点
D. 网络嗅探又叫网络监听
【单选题】
在嗅探实验中,由于存在大量无用或者不需要的数据,为了效率,需要进行过滤处理,以下属于过滤的着手方面的是___
A. 站过滤
B. 服务过滤
C. 通用过滤
D. 以上都是
【单选题】
下列哪一种网络欺骗技术是实施交换式(基于交换机的网络环境)嗅探攻击的前提?___
A.  IP欺骗 
B.  DNS欺骗 
C.  ARP欺骗
D.  路由欺骗
【单选题】
哪种溢出漏洞是利用编程语言自身存在的安全问题?___
A. 栈溢出
B. 堆溢出
C. 格式化串溢出
D. BBS溢出
【单选题】
缓冲区溢出攻击的过程中,攻击时所针对的缓冲区溢出的程序空间可以为任意空间,但因不同地方程序空间的突破方式和内存空间的定位差异,也就产生了多种转移方式,哪种方式需要先找到一个可供溢出的缓冲区___
A. 长跳转缓冲区
B. 函数指针
C. 激活记录
D. 函数指针和激活记录
推荐试题
【单选题】
An administrator is troubleshooting network communications between a vCenter Server and an ESXi 6.5 host. Which log shows the related events between these components?___
A. /var/log/fdm.log
B. /var/log/vpxa.log
C. /var/log/hostd.log
D. /var/log/auth.log
【单选题】
An administrator has recently upgraded from vSphere 6.0 to 6.5, and can no longer see the software iSCSI named vmhba33. Which could be the reason for this?___
A. The upgrade has changed the vmhba name.
B. vSphere 6.5 automates iSCSI configurations.
C. vSphere 6.5 no longer supports software iSCSI.
D. The upgrade has deleted the vmhba.
【单选题】
An administrator is trying to vMotion a VM from his datacenter to a recovery site. Which is the maximum allowed RTT (Round-Trip Time) latency between source and destination host?___
A. 100 milliseconds
B. 150 milliseconds
C. 15 milliseconds
D. 10 milliseconds
【单选题】
Which is required for configuring iSCSI Software Adapter network port binding?___
A. VMkernel of the iSCSI traffic must be load balanced using Route based on IP Hash algorithm.
B. VMkernel of the iSCSI traffic must be load balanced using Route based on Source Virtual Port ID algorithm.
C. VMkernel of the iSCSI traffic must be load balanced using Route based on Source MAC Hash algorithm.
D. VMkernel of the iSCSI traffic must be bound to only one active network adapter.
【单选题】
In vSphere Data Protection 6.1, which is the function of a Backup Verification job?___
A. None. Backup Verification job is not a feature of vSphere Data Protection
B. It is a manual task -Power it on -Verify the guest OS -Check started applications
C. It is an automatic process -Restore a virtual machine -Power it on -Verify that the guest OS is booted by communicating with the Backup Verification agent
D. It is an automatic process -Restore a virtual machine -Power it on -Verify that the guest OC is booted by detecting the VMware ToolsTM "heartbeats"
【单选题】
An administrator has enabled vSphere Distributed Switch Health Check. The hosts connected to that Distributed Switch all display an alert:< vSphere Distributed Switch MTU supported status > .The administrator has all of the VMkernel ports MTU sizes set to 1600. Which action will remedy this problem?___
A. Configure the Distributed Switch to MTU 9100.
B. Disconnect and reconnect the physical network cable.
C. Configure the physical switch to MTU 1600.
D. Disable the Distributed Switch MTU.
【单选题】
Which Host Profile Subprofile configuration is used to configure firewall settings for ESXi hosts?___
A. Advanced Configuration Settings
B. General System Settings
C. Security
D. Networking
【单选题】
Where would a vSphere administrator find general vCenter Server logs on a vCenter Server Appliance?___
A. /var/log/vmware/vpxd/
B. /var/log/messages
C. /etc/vmware-vpx/
D. /var/log/vmware/vsan-health/
【单选题】
An administrator wishes to enable network port mirroring based on source port. Which feature should be enabled?___
A. vSphere standard switch port
B. ERSPAN
C. NSX Virtual Wire
D. VLAN
【单选题】
Which CLI command shows the physical uplink status for a vmnic?___
A. esxcli network ip connection list
B. esxcli network ip neighbor list
C. esxcli network nic get
D. esxcli network nic list
【单选题】
Which is the maximum number of block devices (LUNs) that are supported by ESXi hosts that are running version 6.5?___
A. 1024
B. 512
C. 2048
D. 256
【单选题】
When performing a vCenter Server 5.5 for Windows with Microsoft SQL Server Express database migration to vCenter Server Appliance 6.5, which will be the target database?___
A. Microsoft SQL Server Express 2012R2
B. Microsoft SQL Server Standard 2012R2
C. PostgreSQL
D. Oracle DB 11g
【单选题】
An administrator has multiple vCenter Server 6.5 systems but cannot enable Storage I/O Control (SIOC) on a datastore shared by ESXi hosts managed by the vCenter Server systems. Which action should the administrator take to resolve the issue?___
A. Unmount the datastore and then enable SIOC on the vCenter Server system.
B. Configure the datastore to be managed by a single vCenter Server system.
C. Configure Storage DRS and then enable SIOC on the vCenter Server system.
D. Enable Raw Device Mapping (RDM) on the
E. SXi hosts.
【单选题】
“OneAppServer” is a VM template stored in a content library named “LibraryOne”, but the vSphere administrator is not able to use this template for deployment. Why is the administrator unable to deploy OneAppServer?___
A. OneAppServer must be updated before it can be deployed.
B. LibraryOne is a subscribed library and OneAppServer is not downloaded yet.
C. LibraryOne is published and optimized for syncing over HTTP.
D. OneAppServer was imported from a local file on the system.
【单选题】
An administrator sets the Failover Capacity for both CPU and Memory at 25%. Based on the Exhibit below, how much of the cluster’s total CPU resources are still available to power on additional virtual machines?___
A. 45%
B. 25%
C. 70%
D. 60%
【单选题】
Which statement applies to the vSphere Replication appliance?___
A. Only one vSphere Replication appliance can be deployed per vCenter Server instance.
B. VMware Tools in the vSphere Replication appliance can be upgraded.
C. A single vSphere Replication appliance can manage a maximum of 4000 replications.
D. vSphere Replication is available only with the vSphere
E. ssentials Plus license.
【单选题】
Which esxcli namespace can a vSphere Administrator use to adjust the queue depth?___
A. esxcli system module parameters
B. esxcli storage core device
C. esxcli system module set
D. esxcli storage core adapter
【单选题】
Which statement regarding datastore clusters meets VMware’s recommended best practices?___
A. Clusters should contain only datastores presented from the same storage array.
B. Clusters should contain only datastores with equal hardware acceleration capability.
C. Clusters should contain only datastores with the same capacity.
D. Clusters should contain only datastores using the same connection method (iSCSI, FC, etc.).
【单选题】
What VM Monitoring setting would ensure that the maximum reset window for a virtual machine is 24 hours?___
A. Medium
B. Low
C. High
D. Normal
【单选题】
What is the default space threshold for vSphere Storage DRS?___
A. 80%
B. 70%
C. 90%
D. 95%
【单选题】
Which is the correct sequence to upgrade a vSphere infrastructure?___
A. vCenter Server>ESXi host> VMware Tools>VM compatibility
B. ESXi host>vCenter Server> VMware Tools>VM compatibility
C. vCenter host> ESXi host> VM compatibility> VMware Tools
D. ESXi host>vCenter Server> VM compatibility>VMware Tools
【单选题】
An administrator has a large boot from SAN cluster and wants to ensure consistent configuration by using host profiles. What special considerations are required for boot from SAN hosts?___
A. Change the “Device is shared clusterwide” setting to “false” in the host profile.
B. Verify that the boot LUN is correctly identified as the boot device in the host profile.
C. The boot from SAN device must report as a local device.
D. Host profiles are incompatible with boot from SAN hosts.
【单选题】
When using VMware Converter to import a Windows server and improve the consistency of the destination virtual machine, which optional step can be performed immediately prior to powering down the source server?___
A. Perform a final synchronization task.
B. Remove the server from the network.
C. Uninstall production applications.
D. Remove the server from the Active Directory domain.
【单选题】
Restoration of the vCenter Server Appliance is accomplished using which interface?___
A. vSphere Web Client
B. vSphere Client
C. vCenter Server Appliance Management Interface
D. vCenter Server Appliance GUI Installer
【单选题】
When attempting to migrate a virtual machine to another host in the same cluster, the error message, “Select a valid compute resource” returns. What could cause this error?___
A. Both hosts run different versions of ESXi.
B. Both hosts are not sharing the same datastore.
C. VMware Tools is not installed.
D. Virtual machine has an ISO attached.
【单选题】
When will vSphere Data Protection delete the expired backup image of a Platform Service Controller?___
A. Immediately after the retention period has expired.
B. After the expired backup image is restored.
C. During the next backup window following expiry.
D. During the next maintenance window following expiry.
【单选题】
Group A has permission to download files in Content Library. Group B does not have permission to download files in Content Library. If a user is a member of both groups, what will be the result?___
A. The user cannot download file from Content Library.
B. The user can download file from Content Library.
C. The user cannot access Content Library.
D. The user can access Content Library.
【单选题】
An administrator is trying to set up Host Partial Failure Response, but the Automated option is grayed out. What can the administrator change to enable the Automated option?___
A. Change the vSphere DRS Automation level to Partially Automated.
B. Change the vSphere DRS Automation level to Fully Automated.
C. Enable vSphere HA Host Monitoring.
D. Change the vSphere DPM Automation level to Automatic.
【单选题】
When you attempt to open a virtual machine console from the vSphere Web Client, the console does not connect. The following error message appears:<HTTP ERROR 404> <Problem accessin/.Reason: Not Found>. Why did not connect?___
A. Port 443 is in use.
B. Port 9443 is in use.
C. Port 8443 is in use.
D. Port 22443 is in use.
【单选题】
What new feature was introduced to the Content Library in vSphere 6.5?___
A. Mount an ISO directly from the Content Library.
B. Deploy a virtual machine from an OVF Package in a Content Library.
C. Upload a File from a URL to a Library Item.
D. Upload a File from a Local System to a Library Item.
【单选题】
How can an administrator exclude Encryption rights from a support engineer?___
A. Clone the role Virtual machine power user, remove Cryptographic operations privileges.
B. Clone the role Administrator and assign to the support engineer.
C. Clone the role Virtual machine power user and assign to the support engineer.
D. Clone the role No cryptography administrator and select privileges only for the support engineer.
【单选题】
The administrator must back up a vCenter HA deployment. Which component must be backed up?___
A. Passive node
B. Witness node
C. External database
D. Active node
【单选题】
What is the supported protocol to perform remote L3 traffic monitoring in vSphere 6.5?___
A. VXLAN
B. ERSPAN
C. RSPAN
D. SPAN
【单选题】
What are the minimum hardware requirements for a Windows vCenter Server with embedded PSC that manages a “Small” environment?___
A. 2vCPUs, 16 GB RAM
B. 4 vCPUs, 16 GB RAM
C. 2 vCPUs, 10 GB RAM
D. 4 vCPUs, 10 GB RAM
【单选题】
Which port is used for communication between ESXi and vSphere Data protection?___
A. 80
B. 443
C. 902
D. 22
【单选题】
What can prevent Storage DRS from functioning on a datastore?___
A. The datastore is configured for Virtual Machine Swapfile location.
B. The datastore is shared across multiple datacenters.
C. The datastore is connected to a host that is running Storage I/O Control.
D. Storage DRS advanced option IgnoreAffinityRulesForMaintenance is set to 1.
【单选题】
When troubleshooting VMware vCenter Server issues, when logging level provides maximum detail?___
A. Verbose
B. Trivia
C. Info
D. Error
【单选题】
What new feature is introduced in NFS 4.1 on ESXi 6.5?___
A. IPv6
B. KRB5i
C. AUTH_SYS
D. Storage DRS
【单选题】
What configuration option would ensure that a virtual NUMA topology is defined on VMs having more than eight virtual CPUs?___
A. cupid.coresPerSocket
B. numa.vcpu.followcorespersocket
C. numa.vcpu.maxPerVirtualNode
D. numa.vcpu.min
【单选题】
What is the minimum disk space required to deploy vSphere Data Protection (VDP) with 8 TB configuration?___
A. 4 TB
B. 16 TB
C. 8 TB
D. 12 TB