<< Prev Question Next Question >>

Question 28/30

What is an attack in which the attacker sets the source IP address and port to be the same as the destination IP address and port where the IP address is the address of the target machine and the port is an open port on the target machine?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (30q)
Question 1: What command must be used to enable IPSec on the Foreign Age...
Question 2: What is the result of the "authentication mn-aaa renew-and-d...
Question 3: What two mechanisms can content filtering be achieved throug...
Question 4: Which interface is used to establish a Mobile IP tunnel betw...
Question 5: Refer to the exhibit. (Exhibit) How would HA select a defaul...
Question 6: Which two nodes assign IP addresses to Mobile for Simple IP?...
Question 7: Which access ruledef configuration can be used to match all ...
Question 8: What UDP port is used between PCF and PDSN for the A11 inter...
Question 9: Which Cisco ASR 5000 CLI options are available actions that ...
Question 10: Which message is sent from the PDSN to the AAA server to ind...
Question 11: What two tunnelling protocols does Mobile IPv4 use? (Choose ...
Question 12: Which configuration in an AAA group defines the attribute na...
Question 13: PDSN Simple IP LAC services can be applied to incoming PPP s...
Question 14: Which two result codes in CCA-U from primary Online Charging...
Question 15: What does the X-Header Insertion feature on the Cisco ASR 50...
Question 16: Which context is used on the standalone PDSN to configure IP...
Question 17: Which two protocols are used in Simple IP by Mobile? (Choose...
Question 18: Which configuration will set the next hop address for post p...
Question 19: Which configuration sequence in HA on the Cisco ASR 5000 is ...
Question 20: Which statement best describes the role the Cisco ASR 5000 s...
Question 21: What does the Cisco ASR 5000 PDSN do when subscriber's authe...
Question 22: Which statement is correct when 'domain cisco.com default su...
Question 23: IPSec Encapsulating Security Payload uses what IP protocol n...
Question 24: Refer to the exhibit. (Exhibit) How would you enable failure...
Question 25: What command will display information pertaining to a L2TP s...
Question 26: Which RFC specifies the Diameter base protocol?...
Question 27: Which option describes the GRE protocol?...
Question 28: What is an attack in which the attacker sets the source IP a...
Question 29: Which ruledef configuration can be used for charging of HTTP...
Question 30: What is the default port used for in Mobile IP Registration ...