网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Client exclusion policies are used to mitigate which of the following attacks?()
A
dictionary
B
bit-flip and replay
C
mac spoofing
D
man-in-the-middle
参考答案
参考解析
解析:
暂无解析
更多 “单选题Client exclusion policies are used to mitigate which of the following attacks?()A dictionaryB bit-flip and replayC mac spoofingD man-in-the-middle” 相关考题
考题
Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
A. A client group is a list of clients associated with a group.B. A client group is a list of groups associated with a client.C. Client groups are referenced in security policy in the same manner in which individual clients are referenced.D. Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
考题
Which two statements are true with regard to policy ordering? ()(Choose two.)
A. The last policy is the default policy, which allows all traffic.B. The order of policies is not important.C. New policies are placed at the end of the policy list.D. The insert command can be used to change the order.
考题
A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat()
A. Incident responseB. Asset managementC. Patch managementD. Policies and procedures
考题
A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()
A.User ID/password fileB.Communications layerC.Client applicationsD.Operating system
考题
On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()
A. Source Quench.B. Learning.C. Buffering.D. Windowing.E. Cut-Through.
考题
Which two statements regarding firewall user authentication client groups are true?() (Choose two.)A、A client group is a list of clients associated with a group.B、A client group is a list of groups associated with a client.C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
考题
Which file characteristic cannot be used in the Cisco IronPort Data Security policies?() A、 file typeB、 file sizeC、 file ageD、 file name
考题
On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()A、Source Quench.B、Learning.C、Buffering.D、Windowing.E、Cut-Through.
考题
Which GSS "source access list" is used to allow access to GSS by clients when GSS is being used as the DNS?()A、 Client IPB、 Proxy IPC、 Client and proxy IPD、 Neither client nor proxy IP
考题
Which two statements are true about Unicast Reverse Path Forwarding Loose Mode?()A、It is used in multihome network scenarios.B、It can be used with BGP to mitigate DoS and DDoS.C、It does not need to have CEF enabled.D、It is enabled via the interface level command ip verify unicast reverse-path.E、It cannot be used with "classification" access lists.
考题
Which of these can not be used in defining policies?()A、time of dayB、user agentC、proxy portD、usage quotas
考题
If all client exclusion policies are enabled,on which number of tries will 802.1x authentications be excluded using controller-based access points?()A、fiveB、threeC、sixD、four
考题
Which statement is correct about the use of the virtual interface on a WLC ?()A、 Used to relay DHCP messagesB、 Used to communicate with LAPsC、 Used to bring up LWAPP tunnelsD、 Used to extend into the wireless client VLAN
考题
Which WLAN device is often used to make wireless connections between buildings or campuses?()A、routerB、bridgeC、access pointD、client adapter
考题
Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A、The cell phone should require a password after a set period of inactivity.B、The cell phone should only be used for company related emails.C、The cell phone data should be encrypted according to NIST standards.D、The cell phone should have data connection abilities disabled.
考题
A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat()A、Incident responseB、Asset managementC、Patch managementD、Policies and procedures
考题
A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()A、User ID/password fileB、Communications layerC、Client applicationsD、Operating system
考题
单选题A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()A
User ID/password fileB
Communications layerC
Client applicationsD
Operating system
考题
单选题Which statement is correct about policies in the Junos OS?()A
Import policies are used to filter routes from the routing table to the forwarding table.B
Import policies are used to filter routes destined for the routing table.C
Import policies are used to filter routes being sent to neighboring devices.D
Import policies are used to filter traffic entering the device.
考题
多选题Which two statements are true with regard to policy ordering? ()(Choose two.)AThe last policy is the default policy, which allows all traffic.BThe order of policies is not important.CNew policies are placed at the end of the policy list.DThe insert command can be used to change the order.
考题
多选题On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()ASource Quench.BLearning.CBuffering.DWindowing.ECut-Through.
考题
单选题Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A
The cell phone should require a password after a set period of inactivity.B
The cell phone should only be used for company related emails.C
The cell phone data should be encrypted according to NIST standards.D
The cell phone should have data connection abilities disabled.
考题
单选题If all client exclusion policies are enabled, on which number of tries will 802.1X authentications be excludedusing controller-based access points?()A
threeB
fourC
fiveD
six
考题
单选题Which file characteristic cannot be used in the Cisco IronPort Data Security policies?()A
file typeB
file sizeC
file ageD
file name
考题
单选题Which GSS "source access list" is used to allow access to GSS by clients when GSS is being used as the DNS?()A
Client IPB
Proxy IPC
Client and proxy IPD
Neither client nor proxy IP
考题
单选题Which statement is correct about the use of the virtual interface on a WLC ?()A
Used to relay DHCP messagesB
Used to communicate with LAPsC
Used to bring up LWAPP tunnelsD
Used to extend into the wireless client VLAN
考题
单选题Which statement is correct about policies in the Junos OS?()A
Export policies are used to filter routes from the RE forwarding table to the PFE forwarding table.B
Export policies are used to filter routes destined for the routing table.C
Export policies are used to filter routes being sent to neighboring devices.D
Export policies are used to filter traffic leaving the device.
热门标签
最新试卷