Which of the following is a technique that uses a Web page that looks like an official part of some trusted environment?
A: DoS attack
B: Phishing
C: Back door
D: Man-in-the-middle attack
A: DoS attack
B: Phishing
C: Back door
D: Man-in-the-middle attack
B
本题目来自[网课答案]本页地址:https://www.wkda.cn/ask/paozzxjeztyxtzo.html
举一反三
- Which method is of gaining access to a system that bypasses normal security measures?() A: Starting a Smurf attack B: Conducting social engineering C: Creating a back door D: Launching a DoS attack
- Which of the following is not a password attack method? ( ) A: Dictionary attack B: Brute force C: Replay attack D: Port scan
- Only when they are injured______. A: will some animals attack a human being B: a human being will be attacked by some animals C: some animals will attack a human being D: that some animals attack a human being
- Where do you configure SCREEN options?() A: zones on which an attack might arrive B: zones you want to protect from attack C: interfaces on which an attack might arrive D: interfaces you want to protect from attack
- Which of the following pages are NOT numbered except __________? A: the back of the abstract B: the title page C: the back of the title page D: the table of contents
内容
- 0
Which of the following is NOT function of white blood cells ____. A: Guard against infection B: Fight parasites C: Attack bacteria D: Carry oxygen
- 1
Which among the following is a way to shut down an ISP or website? A: Denial of service attack B: Viruses C: Trojan horses D: Worms
- 2
He is determined to become an artist and I think that he ___. A: looks like it B: feels like it C: looks the part D: takes the part
- 3
It is said that a grave of a middle aged man ______ about 2,300 BC was found by some English archaeologists in the year of 2002. A: dating back B: B.dated back to C: dating back to D: D.dated from
- 4
He______killed last night if he had taken part in the surprise attack on the night.