网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()
A
Update antivirus definitions
B
MAC filtering
C
Effective security policies
D
User awareness training
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()A Update antivirus definitionsB MAC filteringC Effective security policiesD User awareness training” 相关考题
考题
Risk mitigation includes all but which of the following:A Developing system (policies, procedures, responsibilities)B Obtaining insurance against lossC performing contingent planningD developing planning alternativesE identification of project risks.
考题
Risk mitigation involves all but which of the following:A developing system standards (policies, procedure, responsibility standards)B obtaining insurance against lossC identification of project risksD performing contingent planningE developing planning alternatives
考题
113 Risk mitigation involves all but which of the following:A. developing system standards (policies, procedure, responsibility standards)B. obtaining insurance against lossC. identification of project risksD. performing contingent planningE. developing planning alternatives
考题
166 Risk mitigation includes all but which of the following:A. Developing system (policies, procedures, responsibilities)B. Obtaining insurance against lossC. performing contingent planningD. developing planning alternativesE. identification of project risks
考题
Which of the following is BEST for providing network security?()
A.FirewallB.DMZC.SwitchD.IDS
考题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS
考题
Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?()
A. Disable TELNETB. Disable IGMP snoopingC. Enable TELNET but not SSLD. Disable ICMP/ping on device
考题
Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()
A.Update antivirus definitionsB.MAC filteringC.Effective security policiesD.User awareness training
考题
Which of the following techniques is NOT used in the Grammar-Translation Method?A.Reading
B.Translation
C.Written work
D.Oral presentation
考题
You are responsible for increasing the security within the Company LAN. Of the following choices listed below, which is true regarding layer 2 security and mitigation techniques? ()A、 Enable root guard to mitigate ARP address spoofing attacks.B、 Configure DHCP spoofing to mitigate ARP address spoofing attacks.C、 Configure PVLANs to mitigate MAC address flooding attacks.D、 Enable root guard to mitigate DHCP spoofing attacks.E、 Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted ports.F、 Configure port security to mitigate MAC address flooding G、 None of the other alternatives apply
考题
Routers can be used to integrate a variety of services. Which two common services are often specified by businesses?()A、 Mitigation and ResponseB、 Fibre Channel over EthernetC、 IP communicationsD、 Data Center VirtualizationE、 VPN security
考题
Which of the following is BEST for providing network security?()A、FirewallB、DMZC、SwitchD、IDS
考题
Which of the following techniques is used for tracking the project risks?()A、Probability-Impact matrixB、Pareto chartC、R-ChartD、PERT (Program Evaluation and Review Technique) analysis
考题
Which of the following security threats involves making phone calls?()A、PhishingB、VishingC、DDoSD、Xmas attack
考题
Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?()A、Disable TELNETB、Disable IGMP snoopingC、Enable TELNET but not SSLD、Disable ICMP/ping on device
考题
Which of the following does not affect security on a wireless access point?()A、EncryptionB、DHCPC、PasswordD、SSID
考题
A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()A、WEPB、Port filteringC、WPAD、Longer SSID broadcast intervals
考题
An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?()A、Caching enginesB、QoSC、Traffic shapingD、Load balancing
考题
Which of the following are examples of physical security measures?()A、Policies and proceduresB、EncryptionC、Locked doorsD、Security personnelE、Backup tapes
考题
Which of the following wireless security techniques is the MOST secure?()A、Enable Wired Equivalent PrivacyB、Disable SSID broadcastC、Enable Wi-Fi Protected AccessD、Enable MAC filtering
考题
An administrator needs to configure a server to restrict mail traffic to an application server for security reasons. Which of the following techniques can be used to manage this?()A、 PATB、 ACLsC、 Subnet maskingD、 Port blocking
考题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS
考题
A System p administrator is investigating a possible security breech and wants to review information about failed login attempts to the system. Which of the following commands will show this()A、fwtmp /etc/security/failedloginB、cat /etc/security/failedloginC、whoD、alog -f /etc/security/failedlogin -o
考题
Which of the following options should be used to obtain the latest security patches for AIX?()A、FixDistB、The Bonus Pack CDC、OPSD、The Security Maintenance CD
考题
A System p administrator needs to set the default password length for all users to six characters. Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user
考题
单选题An administrator needs to configure a server to restrict mail traffic to an application server for security reasons. Which of the following techniques can be used to manage this?()A
PATB
ACLsC
Subnet maskingD
Port blocking
考题
多选题Which of the following are examples of physical security measures?()APolicies and proceduresBEncryptionCLocked doorsDSecurity personnelEBackup tapes
热门标签
最新试卷