单项选择题
A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()
A. It enables an attacker to perform an IP sweep of devices.
B. It enables a hacker to know which operating system the system is running.
C. It can overflow the session table to its limit, which can result in rejection of legitimate traffic.
D. It creates a ping of death and can cause the entire network to be infected with a virus.
相关考题
-
单项选择题
Which statement describes a security zone?()
A. A security zone can contain one or more interfaces.
B. A security zone can contain interfaces in multiple routing instances.
C. A security zone must contain two or more interfaces.
D. A security zone must contain bridge groups. -
单项选择题
What is the correct syntax for applying node-specific parameters to each node in a chassis cluster?()
A. set apply-groups node$
B. set apply-groups (node)
C. set apply-groups $(node)
D. set apply-groups (node)all -
多项选择题
Which three components can be leveraged when defining a local whitelist or blacklist for antispam on a branch SRX Series device? (Choose three.)()
A. spam assassin filtering score
B. sender country
C. sender IP address
D. sender domain
E. sender e-mail address
