【简答题】A computer virus is a computer program that is created to make and spread copies of itself. The program may however also be designed to have other effects on the systems it infects, ranging from the a...
【多选题】The Company security administrator is concerned with layer 2 network attacks. Which two statements about these attacks are true? ()
A.
ARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.
B.
ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP message with a forged identity to a transmitting host.
C.
MAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.
D.
ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP packet that contains the forged address of the next hop router.
E.
MAC address flooding is an attempt to redirect traffic to a single port by associating that port with all MAC addresses in the VLAN.
【单选题】In a Bridged 1483 network, an ISP has received complaints from their subscribers of denial of service attacks. The ISP suspects these attacks are coming from other subscribers that share the same IP u...
【单选题】_____ l In murders investigated by the FBI, more than one-third have been committed by one family member against anothet. 2 Three percent of them involve the murder of a child by a parent. 3 Aggressio...
A.
Abuse of children by parents is widespread in the United States.
B.
Aggression is part of many marriages in this country.
C.
In the United States, family violence is increasing steadily.
D.
In the United States, aggression is often directed toward members of one's own family.