Which of the following statements regarding buffer overflow attacks is false?
A. The buffer overflow attack indicates that an attacker uses defects of memory operations of the software system and runs attack codes with high operation rights.
B. The buffer overflow attack is irrelevant to the OS vulnerabilities and architecture.
C. The buffer overflow attack is an application-layer attack.
D. The buffer overflow attack is the most common attack of the software system.
正解:B
質問 2:
BFD (bidirectional forwarding detection) is a fast detection technology but is complex, It needs to be supported by special devices.
A. TRUE
B. FALSE
正解:B
質問 3:
What about all outgoing labels in the label forwarding table of a MPLS-capable device for different mutes with the same next hops?
A. They must be different.
B. They may be the same.
C. They must be the same.
正解:A
質問 4:
What is the BFD version number supported by VRP?
A. Version 1
B. Version 3
C. Version 2
D. Version 4
正解:A
質問 5:
What are the factors that affect the quality of network communication? (Multiple choice)
A. Broadband
B. Jitter
C. Delay
D. Packet loss rate
正解:A,B,C,D
質問 6:
The stateful inspection firewall uses the session table to trace activated TCP and UDP sessions, firewall security policies determine which sessions are established, and only the packets associated with sessions are forwarded.
A. TRUE
B. FALSE
正解:A
长曽** -
H12-222-ENU試験のテキストですが、これが実に解り易い。アプリ版も付いているので移動時の勉強にも最適