网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following web browser features deters users from visiting spoofed sites?()
A
Anti-malware detection
B
Anti-phishing filters
C
Anti-spyware filters
D
Antivirus engines
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following web browser features deters users from visiting spoofed sites?()A Anti-malware detectionB Anti-phishing filtersC Anti-spyware filtersD Antivirus engines” 相关考题
考题
WWW is popular for its multimedia transmission and friendly(71). Although the speed of network has been improved considerably in recent years, the rapid(72)of using the Internet, the inherited character of delay in the network and the Request/Response working mode of WWW still make the Internet traffic very(73)and give no guarantee on the Quality of Service. Because HTTP has no states, the web server cannot know the users' demand and the users' requests cannot be predicted Taking advantage of a cache mechanism and the time locality of WWW accesses, the browser can preserve the documents ever accessed in the local machine. By this means, for the documents in the local cache, the browser does not need to send the requests to the remote server or to receive the whole responses from the remote one Pre-fetching uses the space locality of accesses First, the users' access requests are predicted according to the users' current request. Secondly, the expected pages are fetched into the local cache when the user is brow sing the current page. Finally, the users can access these pages downloaded from the local cache. And this can reduce the access delay to some degrees. Pre-fetching is one kind of active caches that can cache the pages which are still not requested by the user. The application of pre-fetching technology in the web can greatly reduce the waiting time after users have sent their requests. This paper brings forward an intelligent technique of web pre-fetching, which can speed up fetching web pages. In this technique, we use a simplified WWW data model to represent the data in the cache of web browser to mine the association rules. We store these rules in a knowledge base so as to(74)the user's actions. In the client sides, the agents are responsible for mining the users' interest and pre-fetching the web pages, which are based on the interest association repository. Therefore it is(75)for the users to speed up the browsing.A.interactiveB.interactionC.interactivityD.infection
考题
Which two UTM features require a license to be activated? ()(Choose two.)
A. antispamB. antivirus (full AV)C. content filteringD. Web-filtering redirect
考题
Which three of the following are valid CRS deployment scenarios? ()A、High Availability CRS Engines running on hardware from different server classes B、High Availability CRS Engines running on similar hardware from the same server class but from different vendors C、High Availability CRS Engines and database and a simplex Recording Server D、High Availability CRS Engines and four simplex VoIP Monitoring Servers E、CCM co-resident deployment on an MCS 7815
考题
A web browser need NOT always perform a complete request for a particular page that it suspects mightNOT have changed. The HTTP specification provides a mechanism for the browser to retrieve only a partialresponse from the web server; this response includes information, such as the Last-Modified date but NOTthe body of the page. Which HTTP method will the browser use to retrieve such a partial response?()A、GETB、ASKC、SENDD、HEADE、TRACE
考题
Which of the following web browser features deters users from visiting spoofed sites?()A、Anti-malware detectionB、Anti-phishing filtersC、Anti-spyware filtersD、Antivirus engines
考题
()are web sites that search the web for occurrences of a specified word or phrase.A、InternetB、WWWC、JavaD、Search engines
考题
Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()A、Intrusion detectionB、VirtualizationC、KitingD、Cloning
考题
Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()A、net viewB、ipconfigC、digD、ifconfig
考题
A customer wants to have employees work from remote locations as well as in the office. All communications must be secure and files must be protected from access by unauthorized people. The employee’s applications (database inserts and reads) are only accessed with a web browser. Which of the following capabilities is necessary?()A、SSLB、PGPC、File encryption programD、Public key encryption
考题
You are creating a web form with this HTML: 11. 12. 13. 14. 15. Which HTTP method is used when sending this request from the browser?()A、GETB、PUTC、POSTD、SENDE、FORM
考题
Which two UTM features require a license to be activated? ()(Choose two.)A、antispamB、antivirus (full AV)C、content filteringD、Web-filtering redirect
考题
Your network contains a Web server named Server1 that runs Windows Server 2003 and Internet Information Server (IIS). Server1 has a server certificate from an Enterprise Certificate Authority (CA) installed. External users report that when they try to access the Web site from outside the corporate network by using a Web browser, they receive the following warning message: There is a problem with this Web sites security certificate. The security certificate presented by this Web site was not issued by a trusted certificate authority. You find that users onthe corporate network do not receive this error. You need to ensure that external users do not receive the warning message when connecting to Server1. What should you do?()A、In IIS Manager, enable the Enable client certificate mapping option.B、In IIS Manager, replace the certificate with a certificate obtained from a public Certification Authority.C、In Local Security Policy, enable Domain Member: Require strong (Windows 2000 or later) session key.D、In Local Security Policy, enable Domain Member: Digitally encrypt or sign secure channel data (always).
考题
单选题Examine the following items, which one offers a variety of security solutions, including firewall, IPS, VPN,antispyware, antivirus, and antiphishing features?()A
Cisco IOS routerB
Cisco PIX 500 series security applianceC
Cisco 4200 series IPS applianceD
Cisco ASA 5500 series security appliance
考题
单选题Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()A
net viewB
ipconfigC
digD
ifconfig
考题
单选题You are creating a web form with this HTML: 11. 12. 13. 14. 15. Which HTTP method is used when sending this request from the browser?()A
GETB
PUTC
POSTD
SENDE
FORM
考题
单选题A virus has been removed from the user’s machine, but the user still cannot access the Internet.Which of the following should the technician check NEXT?()A
Disable port forwarding on the router.B
Reboot to Safe Mode and see if the Internet is accessible.C
Format the machine and reinstall the OS.D
Check the web browser’s proxy settings.
考题
单选题Which of the following features would hide internal IP addresses from the Internet?()A
Network Address TranslationB
Port forwardingC
Quality of ServiceD
SSID broadcast
考题
单选题Which of the following statements is true according to the passage?A
The address system was used to make web pages.B
The World Wide Web was created in Switzerland.C
The fist web browser was very expensive to buyD
Many people could use the Internet before 1990
考题
单选题Your network contains a Web server named Server1 that runs Windows Server 2003 and Internet Information Server (IIS). Server1 has a server certificate from an Enterprise Certificate Authority (CA) installed. External users report that when they try to access the Web site from outside the corporate network by using a Web browser, they receive the following warning message: There is a problem with this Web sites security certificate. The security certificate presented by this Web site was not issued by a trusted certificate authority. You find that users onthe corporate network do not receive this error. You need to ensure that external users do not receive the warning message when connecting to Server1. What should you do?()A
In IIS Manager, enable the Enable client certificate mapping option.B
In IIS Manager, replace the certificate with a certificate obtained from a public Certification Authority.C
In Local Security Policy, enable Domain Member: Require strong (Windows 2000 or later) session key.D
In Local Security Policy, enable Domain Member: Digitally encrypt or sign secure channel data (always).
考题
单选题Which of the following steps does a customer use to upgrade the firmware on the AMM to the latest level?()A
Open a Web browser and log on to the IMM; in the navigation frame, click IMM Firmware Update under IMM Control; click Browse; select the .exe file; click the Upgrade/Update button B
TFTP to the AMM; from the Main Menu, select Update; browse to the downloaded .exe file C
Telnet to AMM; from the Main Menu, select Update; browse to the downloaded .pkt file D
Open a Web browser and log on to the AMM; in the navigation frame, click AMM Firmware Update under AMM Control; click Browse; select the .pkt file; click the Upgrade/Update button
考题
多选题Which three of the following are valid CRS deployment scenarios? ()AHigh Availability CRS Engines running on hardware from different server classesBHigh Availability CRS Engines running on similar hardware from the same server class but from different vendorsCHigh Availability CRS Engines and database and a simplex Recording ServerDHigh Availability CRS Engines and four simplex VoIP Monitoring ServersECCM co-resident deployment on an MCS 7815
考题
单选题()are web sites that search the web for occurrences of a specified word or phrase.A
InternetB
WWWC
JavaD
Search engines
考题
单选题Which of the following features sets IBM apart from competitors in the area of partitioning?()A
Software supportB
Hardware isolationC
Static changes in partitionsD
Micro-Partitioning
考题
单选题Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()A
net viewB
ipconfigC
digD
ifconfig
考题
单选题A customer wants to have employees work from remote locations as well as in the office. All communications must be secure and files must be protected from access by unauthorized people. The employee’s applications (database inserts and reads) are only accessed with a web browser. Which of the following capabilities is necessary?()A
SSLB
PGPC
File encryption programD
Public key encryption
考题
单选题Your network contains a stand-alone certification authority (CA) and a Web server. The Web server hosts a secure Web site. The Web site uses a server certificate that was issued from the CA. Users report that they receive a certificate warning message when they connect to the Web site. You need to prevent users from receiving the certificate warning message when they connect to the Web site. What should you do from the Internet Options in Internet Explorer?()A
Import the CA certificate to the trusted root CA certificate store. B
Import the server authentication certificate to the trusted publishers certificate store.C
Clear the Check for publisher's certificate revocation check box. D
Clear the Require server verification (https:) for all sites in this zone check box for the Trusted sites zone.
考题
单选题A web browser need NOT always perform a complete request for a particular page that it suspects mightNOT have changed. The HTTP specification provides a mechanism for the browser to retrieve only a partialresponse from the web server; this response includes information, such as the Last-Modified date but NOTthe body of the page. Which HTTP method will the browser use to retrieve such a partial response?()A
GETB
ASKC
SENDD
HEADE
TRACE
热门标签
最新试卷