Which of the following is a technique that uses a Web page that looks like an official part of some trusted environment?
A: DoS attack
B: Phishing
C: Back door
D: Man-in-the-middle attack
A: DoS attack
B: Phishing
C: Back door
D: Man-in-the-middle attack
举一反三
- Which method is of gaining access to a system that bypasses normal security measures?() A: Starting a Smurf attack B: Conducting social engineering C: Creating a back door D: Launching a DoS attack
- Which of the following is not a password attack method? ( ) A: Dictionary attack B: Brute force C: Replay attack D: Port scan
- Only when they are injured______. A: will some animals attack a human being B: a human being will be attacked by some animals C: some animals will attack a human being D: that some animals attack a human being
- Where do you configure SCREEN options?() A: zones on which an attack might arrive B: zones you want to protect from attack C: interfaces on which an attack might arrive D: interfaces you want to protect from attack
- Which of the following pages are NOT numbered except __________? A: the back of the abstract B: the title page C: the back of the title page D: the table of contents