网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following could be used to prevent an attacker from accessing the master boot drive when attaching a hard drive to another system?()
A

BIOS password

B

Domain membership

C

EFS

D

Bitlocker


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following could be used to prevent an attacker from accessing the master boot drive when attaching a hard drive to another system?()A BIOS passwordB Domain membershipC EFSD Bitlocker” 相关考题
考题 A legacy network that is prone to errors may have issues with services that use UDP. Which of the following services could have problems in this case, due to the fact that UDP is used?() A.DNSB.TelnetC.SMTPD.SNMPE.HTTPF.TFTP

考题 Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()A、Spanning Tree ProtocolB、Shortest path first treeC、Link-state advertisements (LSA)D、Hold-down timersE、Split horizonF、VRP

考题 Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()A、Attacker sends multiple DHCP requests flooding DHCP serverB、Attacker connects rogue server initiating DHCP requestsC、Attacker connects rogue server replying to DHCP requestsD、Attacker sends DHCP jam signal causing DHCP server to crashE、Attacker sends gratuitous ARP replies, thereby jamming the DHCP serverF、Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server

考题 Which of the following could be used to provide a Layer 3 data path between separate VLANs?()A、 VLAN trunkingB、 An external routerC、 An internal route processorD、 VLAN capable bridgeE、 EtherChannel

考题 Which of the following commands could be used to start the Management Console on a workstation running Windows 2000/XP?()A、Start  Run  MCPB、Start  Run  MCEC、Start  Run  MCAD、Start  Run  MMC

考题 A legacy network that is prone to errors may have issues with services that use UDP. Which of the following services could have problems in this case, due to the fact that UDP is used?()A、DNSB、TelnetC、SMTPD、SNMPE、HTTPF、TFTP

考题 Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()A、RIPB、0S:FC、STPD、EGP

考题 Which of the following could be used to restrict access to the local web server to only certain IP addresses?()A、 Create an ACL.B、 Create an application exception.C、 Configure IPSec.D、 Block port 80.

考题 Which of the following would an attacker use to footprint a system?()A、RADIUSB、Password crackerC、Port scannerD、Man-in-the-middle attack

考题 Which of the following storage tools could be used to initiate the rebuilding of a failed hard drive?()A、RAID array managementB、CHKDSKC、Monitoring agentsD、Partitioning management

考题 Which of the following could be used to prevent an attacker from accessing the master boot drive when attaching a hard drive to another system?()A、BIOS passwordB、Domain membershipC、EFSD、Bitlocker

考题 Which of the following utilities could be used to determine a subnet mask?()A、PINGB、NSLOOKUPC、TRACERTD、IPCONFIG

考题 Which of the following resources could be used to obtain the latest IBM DS Storage ManagerUser’s Guide?()A、InfoCenter web siteB、Announcement letterC、IBM Redbook web siteD、IBMTechline/Partnerline

考题 Which two statements regarding asymmetric key encryption are true?()A、The same key is used for encryption and decryption.B、It is commonly used to create digital certificate signatures.C、It uses two keys: one for encryption and a different key for decryption.D、An attacker can decrypt data if the attacker captures the key used for encryption

考题 单选题Which of the following could BEST be used to recover a failed RAID 1 disk after it has been replaced?()A  Tape restore utilitiesB  Imaging utilitiesC  Partitioning utilitiesD  Array management utilities

考题 单选题Which of the following can be concluded from the author’s statement “Any beneficial substances from the turtles could also be synthesized chemically, so as to prevent the killing of turtles” in Paragraph 3 ?A The author feels sorry for killing turtles massively.B Turtles can be used to substitute many other medicines.C Many other kinds of herbs can be as useful as turtles.D International market feels happy for Chinese businessmen to buy.

考题 单选题Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()A RIPB 0S:FC STPD EGP

考题 单选题Which of the following storage tools could be used to initiate the rebuilding of a failed hard drive?()A  RAID array managementB  CHKDSKC  Monitoring agentsD  Partitioning management

考题 单选题Which of the following methods is used to prevent throttling of compressed air through the diesel engine air starting valves?()A Holding the valve open for a long periodB Increasing the starting air pressure usedC Opening the stating air valve quicklyD Reducing the starting air valve size

考题 多选题Which two statements regarding asymmetric key encryption are true?()AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption

考题 多选题A legacy network that is prone to errors may have issues with services that use UDP. Which of the following services could have problems in this case, due to the fact that UDP is used?()ADNSBTelnetCSMTPDSNMPEHTTPFTFTP

考题 多选题Which of the following settings could prevent two potential EIGRP neighbors from becoming neighbors?()AThe i nterface used by one router to connect to the other router is passive in the EIGRP process.BDuplicate EIGRP router IDs.CMismatched Hold Timers.DIP addresses of 10.1.1.1/24 and 10.2.2.2/24, respectively.

考题 多选题Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()ASpanning Tree ProtocolBShortest path first treeCLink-state advertisements (LSA)DHold-down timersESplit horizonFVRP

考题 单选题A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()A All traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewableB Clients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patternsC All traffic is redirected to the VLAN that the attacker used to flood the CAM tableD All traffic is flooded out all ports and an attacker is able to capture all dataE None of the other alternatives apply

考题 多选题Which two statements regarding symmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption.

考题 单选题Which protocol is used by multicast to prevent loops?()A OSPFB RIPC RPFD BGPE EIGRP