Chapter 5
■
Security Fundamentals (Domain 5)
163
7. Which method can be used to stop ping sweep scans?
A. Deploying host intrusion detection systems
B. Deploying network intrusion detection systems
C. Blocking RFC 1918
addresses at the perimeter
D. Blocking ICMP echo requests and echo
replies at the perimeter
8. Which appliance can be used to mitigate denial of service attacks?
A. Honey pots
B. IDS
C. IPS
D. HIDS
9. Which is a common attack method used to attempt to gain access
to a system using a false
identity?
Do'stlaringiz bilan baham: