【单选题】
在Windows系统中,木马程序的自启方式是___
A. 修改系统启动时运行的批处理文件
B. 修改系统文件
C. 修改系统注册表
D. 以上都是
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
下列不属于木马隐藏技术的是。___
A. 进行进程欺骗
B. 新建文件夹
C. 使用攻击者的DLL文件替换掉Windows系统中正常的DLL文件
D. 动态嵌入技术
【单选题】
木马的远程监控功能包括___
A. 获取目标机器信息
B. 记录用户事件
C. 远程操作
D. 以上都是
【单选题】
下列不属于木马软件的是?___
A. Back Orifice
B. SubSeven
C. 360安全卫士
D. 冰河木马
【单选题】
木马的检测包括___
A. 端口扫描和连接检查
B. 监察系统进程
C. 检查.ini文件、注册表和服务
D. 以上都是
【单选题】
下列属于木马发展趋势的有___
A. 跨平台
B. 模块化设计
C. 无连接木马
D. 以上都是
【单选题】
木马的防范包括___
A. 及时修补漏洞,安装补丁
B. 运行实时监控程序
C. 培养风险意识
D. 以上都是
【单选题】
木马植入技术可以大致分为哪两类?___
A. 主动植入和自动植入
B. 主动植入和被动植入
C. 被动植入和自动植入
D. 自动植入和申请植入
【单选题】
木马程序的自启动方式主要有几种。___
【单选题】
“良性病毒”和“恶性病毒”是按照什么分类的。___
A. 按连接方式分类
B. 按破坏力分类
C. 按寄生方式分类
D. 按传播力度分类
【单选题】
木马的发展趋势,以下哪种是错误的?___
A. 无连接木马
B. 跨平台
C. 跨地域
D. 模块化设计
【单选题】
被动植入主要采取什么手段,请回答___
A. 欺骗手段
B. 诈骗手段
C. 隐瞒手段
D. 利用手段
【单选题】
哪一种不是木马程序的自启动方式?___
A. 修改系统文件
B. 添加系统服务
C. 自注册
D. 修改文件关联属性
【单选题】
实现伪隐藏的方式主要是,请回答___
A. 进行进程欺骗
B. 进行进程隐瞒
C. 进行进程隐身
D. 不使用进程
【单选题】
木马通过什么来建立与攻击者之间的联系?___
A. API调用
B. 网络
C. 客户端/服务端模式
D. 使用DDL
【单选题】
以下哪种是非常流行的木马___
A. Back Orifice
B. SubSeven
C. 冰河木马
D. 以上都是
【单选题】
以下哪种不是木马检测方法___
A. 检查系统进程
B. 端口扫描和连接检查
C. 监视网络通信
D. 以上都是
【单选题】
按漏洞利用方式分类,DoS攻击可以分为___
A. 特定资源攻击类
B. 暴力防御类
C. 固定速率
D. 可变速率
【单选题】
泪滴也被称之为。___
A. 整片攻击
B. 分片攻击
C. 一般攻击
D. 特殊攻击
【单选题】
DoS攻击通常通常利用什么漏洞___
A. 传输协议的漏洞
B. 系统存在的漏洞
C. 服务的漏洞
D. 以上都是
【单选题】
死亡之Ping攻击的主要特征是ICMP数据包的大小超过多少字节?___
A. 68888
B. 58588
C. 65535
D. 56636
【单选题】
构造一个特殊的SYN包,需要什么___
A. 源地址和目标地址相同
B. 源代码和目标代码相同
C. 数据源
D. 主机
【单选题】
WinNuke又被称之为什么?___
A. 带内传输攻击
B. 窗口
C. 带外传输攻击
D. 云努克
【单选题】
实现伪隐藏的方式主要是,请回答___
A. 进行进程欺骗
B. 进行进程隐瞒
C. 进行进程隐身
D. 不使用进程
【单选题】
分布式拒绝服务攻击的防御方法有哪些?___
A. 优化网络和路由结构
B. 保护主机系统安全
C. 安装入侵检测系统
D. 以上都是
【单选题】
分布式拒绝服务攻击的防御方法有哪些?___
A. 使用扫描工具
B. 与因特网服务供应商合作全
C. 安装入侵检测系统
D. 以上都是
【单选题】
RID是一个DDoS软件检测程序,其中不能检验的是___
A. TBT
B. TFN
C. TFN2K
D. Trinoo
【单选题】
一个完整的网络安全扫描过程包括以下哪个阶段___
A. 发现目标主机或网络
B. 在发现活动目标后进一步搜集目标信息
C. 根据搜集到的信息进行相关处理,进而检测出目标系统可能存在安全漏洞
D. 以上都是
【单选题】
以下哪种属于端口扫描?___
A. 漏洞扫描
B. 主机扫描
C. FTP代理扫描
D. 远程主机OS指纹识别
【单选题】
以下哪项属于秘密扫描的变种?___
A. UDP扫描
B. SYN扫描
C. Null扫描
D. FIN扫描
【单选题】
被动协议栈指纹识别一般观察以下哪个方面___
A. TTL值
B. Window Size
C. DF
D. 以上都是
【单选题】
以下扫描器中,具有可扩展的框架,提供基于Web的友好界面,并能进行分类检查的是___
A. SATAN
B. ISS Internet Scanner
C. Nessus
D. Nmap
【单选题】
SATAN的四个扫描级别中,在哪个扫描级别上,SATAN试图获取Root的访问权限?___
A. 轻度扫描
B. 标准扫描
C. 重度扫描
D. 攻入系统
【单选题】
X-Scan中,“全局设置”模块包括___
A. 扫描模块
B. 并发扫描
C. 扫描报告
D. 以上都是
【单选题】
以下工具中,哪种是通过在一些端口上监听来自外部的连接请求来判断端口扫描情况___
A. ProtectX
B. Winetd
C. DTK
D. PortSentry
【单选题】
Zone Alarm Pro的优点是___
A. 集成了大量功能组件
B. 功能十分丰富
C. 可靠性强
D. 以上都是
【单选题】
对于自动破解的一般过程。以下说法不正确的是___
A. 找到可用的userID
B. 对个别单词加密
C. 找到多用的加密算法
D. 创建可能的口令名单
【单选题】
口令破解是入侵系统最常用的方式之一,获取口令有许多方法,下列常见手法正确的是___
A. 穷举法
B. 利用口令文件进行口令破解
C. 通过嗅探和木马等其他手段获取口令
D. 以上都是
【单选题】
以下关于口令破解方式正确的是___
A. 词典攻击
B. 强行攻击
C. 组合攻击
D. 以上都是
【单选题】
对于手工破解。下列步骤不正确的是___
A. 产生可能的口令列表
B. 按口令的可能性从低到高排序
C. 依次手动输入每个口令
D. 如果系统允许访问,则成功
推荐试题
【单选题】
A VM folder contains VM1 and VM2. Group A has permission to power on virtual machines, defined on the VM folder and its children. Group B has permission to power off virtual machines, defined on the VM folder and its children. If a user is a member of Groups A and B, what will be the user’s effective permission on VM1 and VM2?___
A. Power on
B. Power off.
C. Power on and Power off.
D. Reset.
【单选题】
Group 1 is granted console interaction on a VM folder. User 1 is granted no console interaction on the same VM folder. What will be the outcome if User 1 tries to access the console of a virtual machine?___
A. User 1 will not be able to access the virtual machines in the VM folder.
B. User 1 will not have access to the virtual machine console.
C. User 1 will have access to the virtual machine console.
D. User 1 will have console access only via the vSphere Web Client.
【单选题】
Which statement is true regarding the use of VMFS3 datastores with vSphere 6.5?___
A. VMFS3 datastores can be used but not created.
B. VMFS3 datastores can be neither used nor created.
C. VMFS3 datastores will be present but unmounted.
D. VMFS3 datastores can be created and used.
【单选题】
In the Exhibit, each VM has a 1GHz non-expandable reservation. If all VMs are powered on in sequence, what would be the outcome?___
A. VM4 cannot be powered on.
B. VM5 cannot be powered on.
C. VM6 cannot be powered on.
D. VM3 cannot be powered on.
【单选题】
vSphere 6.5 introduced MAClearning capabilities for VMware’s virtual switches. What three benefits will it provide? (Choose three.)___
A. Reduced memory consumption.
B. Reduced consumption of extra CPU cycles.
C. Increased network throughput.
D. Prevent packet flooding inside the vSwitch.
【单选题】
What is the default pathing policy for most active-active arrays?___
A. Fixed
B. Most Recently Used
C. Dynamic
D. isk Morroring
【单选题】
Which command will show the iSCSI sessions on a ESXi 6.5 host?___
A. esxcli storage iscsi session get
B. esxcli iscsi session get
C. esxcli storage iscsi session
D. esxcli iscsi session list
【单选题】
Which of the following is not a parameter for traffic filtering or marking?___
A. virtual port ID
B. Protocol
C. Traffic Direction
D. DSCP value
E. Traffic redirection
【单选题】
A vSphere administrator wants to enable a virtual machine with Secure Boot, but in VM setting, Secure Boot option was not found under Boot Options. What could be the cause?___
A. The virtual hardware is not compatible.
B. The virtual machine has missing drivers.
C. The virtual machine OS does not support secure boot.
D. VMware Tools is not upgraded.
【单选题】
A virtual machine is connected on a distributed port group where the average bandwidth configured in the traffic shaping policy is 100 Mbps. The VM network adapter is configured with a reservation of 200 Mbps. What is the VM’s effective bandwidth?___
A. 200 Mbps
B. 100 Mbps
C. 150 Mbps
D. 400 Mbps
【多选题】
What are two reasons why a datastore in a Storage DRS cluster cannot enter maintenance mode?(Choose two.)___
A. Storage latency is too high to allow Storage DRS initiate Storage vMotion.
B. Storage DRS is configured for a VMFS3 datastore.
C. Storage
D. RS is disabled on the virtual disk.
【多选题】
What two methods are used to configure VMware vSphere Storage I/O Control shares and limits? (Choose two.)___
A. Assign shares and limits to VM virtual disks.
B. Assign shares and limits to datastores.
C. Assign shares and limits to Storage (DRS) clusters.
D. Assign shares and limits using VM storage policies.
【多选题】
ESXi 6.5 introduces VMFS6, which supports both 512e and 512n devices. What three configurations are supported when using these devices? (Choose three.) ___
A. Hosts with both 512e and 512n devices.
B. Storage vMotion between both 512e and 512n devices.
C. Datastore Extents spanned between both 512e and 512n devices.
D. Storage DRS clusters containing only both 512e and 512n devices.
【多选题】
A vSphere Administrator observes that the Primary VM configured with Fault Tolerance is executing slowly. After further investigation, it is determined that the Secondary VM is on an overcommitted ESXi host. What two methods will correct the problem? (Choose two.)___
A. Use Storage vMotion to migrate the Secondary VM to another datastore.
B. Use vMotion to migrate the Secondary VM to a different ESXi host.
C. Configure a CPU limit on the Primary VM which will also apply to the Secondary VM.
D. Turn off and turn on FT in order to recreate the Secondary VM on a different datastore.
【多选题】
Which two features require the use of Host Profiles? (Choose two.)___
A. Host Customizations
B. shared storage
C. Auto
D. eploy
【多选题】
What three processes on the vCenter Server Appliance (VCSA) does“vmware-watchdog monitor? (Choose three.) ___
A. vmware-eam
B. vmcad
C. vmware-vpostgres
D. vpxd
E. vsan-health
【多选题】
What three processes on the vCenter Server Appliance (VCSA) does“vmware-watchdog monitor? (Choose three.) ___
A. vmware-eam
B. vmcad
C. vmware-vpostgres
D. vpxd
E. vsan-health
【多选题】
Which two statements correctly describe VM-Host affinity rules? (Choose two.) ___
A. When there is more than one VM-Host affinity rule in a vSphere DRS cluster, the rules are applied equally.
B. After creating a VM-Host affinity rule, its ability to function in relation to other rules is predetermined.
C. When there is more than one VM-Host affinity rule in a vSphere
D. RS cluster, the rules will be ranked.
【多选题】
An administrator wants to enable proactive HA by moving virtual machines automatically if a hardware alert is triggered. What are the three required settings? (Choose three.)___
A. Set vSphere DRS Automation to Partially Automated.
B. Turn on Proactive HA.
C. Set the Proactive HA Automation Level to Manual.
D. Set the Proactive HA Automation Level to Automated.
E. Turn on vSphere HA and vSphere DRS.
【多选题】
If vCenter Server 5.5 installation has one or more services deployed remotely, which three services are relocated to vCenter Server 6.5 on upgrade? (Choose three.)___
A. vCenter Inventory Services
B. vSphere Authentication Proxy
C. vSphere Web Client
D. vSphere
E. SXi Dump Collector
【多选题】
What two debugging levels can a virtual machine be configured to? (Choose two.)___
A. Verbose
B. Debugging
C. Statistics
D. Trivia
【多选题】
What are three benefits of using a few large-capacity LUNs instead of many small-capacity LUNs? (Choose three.) ___
A. Better performance because there is less contention for a single volume.
B. More flexibility for resizing virtual disks.
C. Less wasted storage space.
D. More flexibility to create virtual machines without adding new LUNs.
E. Fewer VMFS datastores to manage.
【多选题】
Which two configurable options are available in Boot Options for a virtual machine? (Choose two.)___
A. Tools Upgrades
B. Encryption
C. Firmware
D. Force BIOS setup
【多选题】
Which three VMware-recommended best practices should an administrator follow before upgrading to vSphere 6.5? (Choose three.)___
A. Disconnect ESXi host from vCenter.
B. VMware Tools are installed in the virtual machine.
C. Ensure that the system hardware complies with ESXi requirements.
D. Back up the host.
E. Check the interoperability of any other software integrated with vSphere.
【多选题】
What are two requirements to enable EVC in vSphere DRS cluster? (Choose two.)___
A. CPUs must be from the same vendor.
B. EVC must use the lowest possible baseline supported by the hardware.
C. CPUs must be in the same family and of the same speed.
D. No VMs may be running in the cluster.
【多选题】
What three conditions could result in VMware Flash Read Cache being unable to claim a disk? (Choose three.)___
A. The disk is not listed in the VMware hardware compatibility guide.
B. The disk is not detected as an SSD.
C. The disk is not detected as local.
D. The disk is in use by VMFs.
【多选题】
Boot from SAN is supported on which three storage technologies? (Choose three.)___
A. VMware vSAN
B. FCoE
C. NFS 4.1
D. iSCSI
E. FC
【多选题】
Which two components are part of storage I/O multipathing on ESXi? (Choose two.)___
A. SATP
B. VASA
C. PSP
D. VAAI
【多选题】
Which two statements are true about Highly Available vSphere Auto Deploy infrastructure? (Choose two.)___
A. It helps prevent data loss.
B. It is a prerequisite for using vSphere Auto Deploy with stateful install.
C. It requires two or more Auto
D. eploy servers.
【多选题】
The virtual machine log rotation size can be changed for all VMs by which two interfaces? (Choose two.)___
A. PowerCLI
B. vSphere Web Client
C. ESXi host client
D. esxcli
【多选题】
Which two configuration options can exclude virtual disks from snapshot operations? (Choose two.)___
A. Use RDM in virtual mode for virtual disk.
B. Use virtual disks in Independent – Persistent mode.
C. Use a virtual disk larger than 2 TB in size.
D. Use RDM in physical mode for virtual disk.
【多选题】
Which two storage configurations on the source server are unsupported with VMware Converter? (Choose two.)___
A. Linux LVM
B. software RAID
C. GPT/MBR hybrid disks
D. Windows basic volumes
E. Windows dynamic volumes
【多选题】
Which two statements about vCenter HA are correct? (Choose two.)___
A. ESXi 5.5 or later is required.
B. vCenter HA network latency between nodes must be less than 50 ms.
C. NFS datastore is supported.
D. It must be deployed on a 3
E. SXi host cluster with DRS enabled.
【多选题】
An attempt to delete NFS datastore from a ESXi host returns the error: Sysinfo error on operation returned the following status:< Busy> Which two statements could explain this failure? (Choose two.)___
A. NFS datastore is a part of Storage DRS Cluster.
B. NFS.VolumeRemountFrequency value is set to 30.
C. Storage I/O Control is enabled on NFS datastore.
D. NFS datastore has running or registered virtual machines.
【多选题】
An administrator finds that the Microsoft Exchange virtual machines are exhibiting network latency. What two in-guest changes can help decrease latency? (Choose two.)___
A. LRO
B. TSO
C. SR-IOV
D. PVRDMA
【多选题】
Which two types of iSCSI adapters require VMkernel networking configuration? (Choose two.)___
A. dependent hardware
B. in-guest
C. software
D. independent hardware
【多选题】
Which two statements are true for NFS v4.1 firewall behavior? (Choose two.)___
A. It closes port 2049.
B. It sets allowed. All flag to TRUE.
C. It sets allowed. All flag to FALSE.
D. It opens port 2049.
【多选题】
A vSphere Administrator attempts to enable Fault Tolerance for a virtual machine but receives the following error: Secondary VM could not be powered on as there are no compatible hosts that can accommodate it. What two options could cause this error? (Choose two.)___
A. The other ESXi host(s) are in Maintenance Mode.
B. Hardware virtualization is not enabled on the other ESXi host(s).
C. The other ESXi host(s) are in Quarantine Mode.
D. Hardware MMU is enabled on the other
E. SXi host(s).
【多选题】
Storage capabilities be populated in what two ways? (Choose two.)___
A. The administrator can use tags to describe capabilities.
B. Default capabilities are provided by vCenter Server.
C. Datastores can advertise their capabilities through VAAI.
D. Datastores can advertise their capabilities through VASA.
【多选题】
In network troubleshooting it is important to know what upstream switch the ESXi host is connected to. Which two features does ESXi provide to help identify the upstream switch? (Choose two.)___
A. Promiscuous mode
B. DPM
C. LLDP
D. CDP