CCNA

 

CCNA

1 / 2

分类: Uncategorized

A. A network intrusion is being investigated through captured packets in Wireshark. Suspicious behavior is indicated in several TCP streams. In one TCP session, the IPv4 header fields show fragmented packets from a known malicious IP. These fragments are reassembled by an internal server. A fragmentation attack is suspected, and IPv4 header fields need analysis. Key fields must be examined for unusual behavior. What must be focused on to determine if a fragmentation-based attack is occurring?

2 / 2

分类: Uncategorized

B. A web application is vulnerable to a type of injection attack that allows attackers to execute arbitrary commands on the host operating system. What is the name of the attack?

您的分数是

平均分为 0%

0%