CCNA 3 月, 21, 2026 admin 未分类 CCNA 1 / 2 分类: Uncategorized A. A network intrusion is being investigated through captured packets in Wireshark. Suspicious behavior is indicated in several TCP streams. In one TCP session, the IPv4 header fields show fragmented packets from a known malicious IP. These fragments are reassembled by an internal server. A fragmentation attack is suspected, and IPv4 header fields need analysis. Key fields must be examined for unusual behavior. What must be focused on to determine if a fragmentation-based attack is occurring? A. Time to Live (TTL) for transit delays B. Identification field for fragment tracking C. Fragment Offset field for order or overlap D. Flags field to verify "Don't Fragment" bit 2 / 2 分类: Uncategorized B. A web application is vulnerable to a type of injection attack that allows attackers to execute arbitrary commands on the host operating system. What is the name of the attack? A. cross-site scripting B. command injection C. pass-the-command D. SQL injection 您的分数是 平均分为 0% 0% 重新开始测验