网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which two statements describe the functions and operations of IDS and IPS systems?()
A

A network administrator entering a wrong password would generate a true-negative alarm.

B

A false positive alarm is generated when an IDS/IPS signature is correctly identified.

C

An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.

D

Cisco IDS works inline and stops attacks before they enter the network.

E

Cisco IPS taps the network traffic and responds after an attack.

F

Profile-based intrusion detection is also known as anomaly detection.


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which two statements describe the functions and operations of IDS and IPS systems?()AA network administrator entering a wrong password would generate a true-negative alarm.BA false positive alarm is generated when an IDS/IPS signature is correctly identified.CAn IDS is significantly more advanced over IPS because of its ability to prevent network attacks.DCisco IDS works inline and stops attacks before they enter the network.ECisco IPS taps the network traffic and responds after an attack.FProfile-based intrusion detection is also known as anomaly detection.” 相关考题
考题 Which two of these statements best describe the benefits of WPAv2? (Choose two.)()A、 SSID broadcast preventionB、 man-in-the-middle attack protectionC、 cost reduction through software upgrades in all existing hardwareD、 dynamic key generationE、 RF jamming prevention

考题 Which two statements complete a transaction? ()A、DELETE employees;B、DESCRIBE employees;C、ROLLBACK TO SAVEPOINT C;D、GRANT SELECT ON employees TO SCOTT;E、ALTER TABLE employees SET UNUSED COLUMN sal;F、SELECT MAX(sal) FROM employees WHERE department_id = 20;

考题 Which two statements accurately describe an IBGP peering session?() (Choose two.)A、Peers are statically defined.B、Peers exist within the same AS.C、Peers must be directly connected to each other.D、Peers advertise routes learned from other IBGP neighbors.

考题 Which two of these statements best describe the benefits of WPAv1? ()A、 SSID broadcast preventionB、 Improved mutual authenticationC、 Improved encryption through AESD、 Improved protection against sniffing initialization vectorsE、 RF jamming prevention

考题 Which two statements describe the advantages to the use of RIP over the use of OSPF?()A、RIP requires less time to convergeB、RIP uses less bandwidthC、RIP is less complex to configureD、RIP demands fewer router resourcesE、RIP has a more accurate metric

考题 Which two statements describe the functions and operations of IDS and IPS systems?()A、A network administrator entering a wrong password would generate a true-negative alarm.B、A false positive alarm is generated when an IDS/IPS signature is correctly identified.C、An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.D、Cisco IDS works inline and stops attacks before they enter the network.E、Cisco IPS taps the network traffic and responds after an attack.F、Profile-based intrusion detection is also known as "anomaly detection".

考题 Which two of these statements best describe fast secure roaming? (Choose two.)()  A、 available only in autonomous APsB、 available in autonomous and lightweight APsC、 a feature of WDS in autonomous APsD、 a feature of WDS in lightweight APsE、 requires at least one AP and one Wireless LAN Services Module

考题 Which of the following describe router functions?()A、Packet switchingB、Collision prevention on a LAN segmentC、Packet filteringD、Broadcast domain enlargementE、Broadcast forwardingF、Internetwork communication

考题 Which three statements describe how the strict SQL mode provides added security?()A、It rejects statements that try to insert out-of-range valuesB、It rejects invalid datesC、It limits the operations that the server can performD、It rejects queries that produce out-of-range valuesE、It rejects dates with zero day or month values

考题 Which two statements are true about the duplexing of the backups taken by RMAN? ()(Choose two.)A、It's only supported for the backups performed on the tapeB、It is not supported for backup operations that produce image copiesC、Duplex backups need a parallelism for the device to be equal to number of copiesD、Duplex backups can be performed to either disk or tape, but cannot be performed on tape and disk simultaneously

考题 Which two statements are true about standard database auditing()A、DDL statements can be audited.B、Statements that refer to stand-alone procedure can be audited.C、Operations by the users logged on as SYSDBA cannot be audited.D、Only one audit record is ever created for a session per audited statement even though it is executedmore than once.

考题 Which four statements correctly describe functions that are available in SQL? ()A、INSTR returns the numeric position of a named character.B、NVL2 returns the first non-null expression in the expression list.C、TRUNCATE rounds the column, expression, or value to n decimal places.D、DECODE translates an expression after comparing it to each search value.E、TRIM trims the heading or trailing characters (or both) from a character string.F、NVL compares two expressions and returns null if they are equal, or the first expression if they are not equal.G、NULLIF compares two expressions and returns null if they are equal, or the first expression if they are not equal.

考题 多选题Which two of these statements best describe fast secure roaming? (Choose two.)()Aavailable only in autonomous APsBavailable in autonomous and lightweight APsCa feature of WDS in autonomous APsDa feature of WDS in lightweight APsErequires at least one AP and one Wireless LAN Services Module

考题 多选题Which two of these statements best describe the benefits of WPAv2? (Choose two.)()ASSID broadcast preventionBman-in-the-middle attack protectionCcost reduction through software upgrades in all existing hardwareDdynamic key generationERF jamming prevention

考题 多选题Which two of these statements best describe the benefits of WPAv1? ()ASSID broadcast preventionBImproved mutual authenticationCImproved encryption through AESDImproved protection against sniffing initialization vectorsERF jamming prevention

考题 多选题Which of the following describe router functions?()APacket switchingBCollision prevention on a LAN segmentCPacket filteringDBroadcast domain enlargementEBroadcast forwardingFInternetwork communication

考题 多选题Which two statements describe the advantages to the use of RIP over the use of OSPF?()ARIP requires less time to convergeBRIP uses less bandwidthCRIP is less complex to configureDRIP demands fewer router resourcesERIP has a more accurate metric

考题 多选题Which four statements correctly describe functions that are available in SQL? ()AINSTR returns the numeric position of a named character.BNVL2 returns the first non-null expression in the expression list.CTRUNCATE rounds the column, expression, or value to n decimal places.DDECODE translates an expression after comparing it to each search value.ETRIM trims the heading or trailing characters (or both) from a character string.FNVL compares two expressions and returns null if they are equal, or the first expression if they are not equal.GNULLIF compares two expressions and returns null if they are equal, or the first expression if they are not equal.

考题 多选题Which two functions of the Junos OS are handled by the data plane? ()(Choose two.)ANATBOSPFCSNMPDSCREEN options

考题 多选题Which two statements describe the default routing policy for BGP?()AAdvertise only locally originated routes.BAccept all BGP routes and import into inet.0.CAdvertise all active BGP routes.DAdvertise only EBGP routes.

考题 多选题Which two statements describe the criteria bandwidth detection uses to dynamically alter bandwidth allocation?()(Choose two.)AThroughput is raised as latency decreases.BThroughput is based on available bandwidth.CThroughput is lowered as latency decreases.DLatency is measured by SYNs returned for each metapacket.

考题 多选题Which two statements describe the purpose of a security policy?()AIt enables traffic counting and logging.BIt enforces a set of rules for transit traffic.CIt controls host inbound services on a zone.DIt controls administrator rights to access the device.

考题 多选题Which two are character manipulation functions? ()ATRIMBREPLACECTRUNCDTO_DATEEMODFCASE

考题 多选题Examine the commands executed to monitor database operations: $ conn sys oracle/oracle@prod as sysdba SQL VAR eid NUMBER SQL EXEC: eid := DBMS_SQL_MONITOR.BEGIN_OPERATION (‘batch_job’ , FORCED_TRACKING = ‘Y’); Which two statements are true?()ADatabase operations will be monitored only when they consume a significant amount of resource.BDatabase operations for all sessions will be monitored.CDatabase operations will be monitored only if the STATISTICS_LEVEL parameter is set to TYPICAL and CONTROL_MANAGEMENT_PACK_ACCESS is set DIAGNISTIC + tuning.DOnly DML and DDL statements will be monitored for the session.EAll subsequent statements in the session will be treated as one database operation and will be monitored.

考题 多选题Which three statements describe how the strict SQL mode provides added security?()AIt rejects statements that try to insert out-of-range valuesBIt rejects invalid datesCIt limits the operations that the server can performDIt rejects queries that produce out-of-range valuesEIt rejects dates with zero day or month values

考题 多选题Which two statements are true regarding single row functions?()AThey accept only a single argumentBThey can be nested only to two levelsCArguments can only be column values or constantsDThey always return a single result row for every row of a queried tableEThey can return a data type value different from the one that is referenced

考题 多选题Which three statements correctly describe the functions and use of constraints? ()AConstraints provide data independence.BConstraints make complex queries easy.CConstraints enforce rules at the view level.DConstraints enforce rules at the table level.EConstraints prevent the deletion of a table if there are dependencies.FConstraints prevent the deletion of an index if there are dependencies.

考题 多选题Which two statements are true about the duplexing of the backups taken by RMAN? ()(Choose two.)AIt's only supported for the backups performed on the tapeBIt is not supported for backup operations that produce image copiesCDuplex backups need a parallelism for the device to be equal to number of copiesDDuplex backups can be performed to either disk or tape, but cannot be performed on tape and disk simultaneously