Which description of a smurf attack is true?
A. A smurf attack is an attack in which small TCP packets are sent toward a server from thousands of subscribers, which causes the server network buffer to overflow and drop packets and results in a denial of service.
B. A smurf attack is an attack in which the attacker sends ICMP echo request packets using a spoofed source IP address destined to remote network broadcast addresses, which results in all recipients replying back to the spoofed source IP address in an attempt to cause a denial of service to the targeted spoofed IP address.
C. A smurf attack is an attack in which the attacker sends UDP echo packets using a spoofed source IP address destined to remote network broadcast addresses, which results in all recipients replying back to the spoofed source IP address in an attempt to cause a denial of service to the targeted spoofed IP address.
D. A smurf attack is an attack in which the attacker attempts to change the TCP MSS value to a small value for all TCP flows destined to the target device, which results in many small packets having to be processed by the target, which causes buffer overflows and denial of service.
Which option describes the ICAP protocol?
A. ICAP is a protocol designed to enable inter-device communications for different vendor systems to share information about subscribers in a common format. ICAP allows for subscriber session control for actions such as session disconnect and suspension.
B. ICAP is a protocol designed to enable subscribers to communicate in a peer-to-peer network for file sharing purposes and is often used to circumvent upstream content filtering.
C. ICAP is a communication access package consisting of a mixed platform of services such as web, FTP, and authentication. ICAP is used to minimize the deployment footprint and expedite new offerings for Internet service providers.
D. ICAP is a protocol designed to support dynamic content filtering, insertion, and modification of web pages. ICAP allows interaction with external content servers such as parental control (content filtering) servers to provide content filtering service support.
Which interface in the UMTS doamin uses the BSSAP+ layer?
A. Gs
B. Gr
C. Ge
D. Ga
When Wi-Fi offloading is enabled, which authentication protocol is used by the TTG over the Wm interface to authenticate/retrieve subscription information at the time of PDP activation?
A. IPsec
B. EAP
C. SSL
D. CHAP
In which three scenarios is a Create Session Request sent to the SGW? (Choose three.)
A. Gn/Gp SGSN to S4 SGSN routing area update
B. Gn/Gp SGSN to MME tracking area update procedure
C. UE requested PDN connectivity
D. UE triggered service request
E. ready to STANDBY transition within the network
F. network triggered service request procedure
Which two configurations are required for narrow band SS7 configuration in the Cisco ASR 5000 system? (Choose two.)
A. link type configuration in the SS7 routing domain
B. framing type configuration at the card level
C. SCCP network association at the port level
D. Iu-PS service association at the port level
E. peer server configuration at the SS7 routing domain
How does an S4-SGSN identify a peer node as an SGSN or MME when GUTI-to-RAI mapping is unavailable?
A. MSB of the LAC value
B. MSB of the RAC value
C. LSB of the LAC value
D. LSB of RAC value
Which two transport protocols does the Diameter base protocol run on? (Choose two.)
A. UDP
B. TCP
C. DCCA
D. SCTP
E. GRE
F. DCCP