网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following web browser features deters users from visiting spoofed sites?()
A

Anti-malware detection

B

Anti-phishing filters

C

Anti-spyware filters

D

Antivirus engines


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following web browser features deters users from visiting spoofed sites?()A Anti-malware detectionB Anti-phishing filtersC Anti-spyware filtersD Antivirus engines” 相关考题
考题 WWW is popular for its multimedia transmission and friendly(71). Although the speed of network has been improved considerably in recent years, the rapid(72)of using the Internet, the inherited character of delay in the network and the Request/Response working mode of WWW still make the Internet traffic very(73)and give no guarantee on the Quality of Service. Because HTTP has no states, the web server cannot know the users' demand and the users' requests cannot be predicted Taking advantage of a cache mechanism and the time locality of WWW accesses, the browser can preserve the documents ever accessed in the local machine. By this means, for the documents in the local cache, the browser does not need to send the requests to the remote server or to receive the whole responses from the remote one Pre-fetching uses the space locality of accesses First, the users' access requests are predicted according to the users' current request. Secondly, the expected pages are fetched into the local cache when the user is brow sing the current page. Finally, the users can access these pages downloaded from the local cache. And this can reduce the access delay to some degrees. Pre-fetching is one kind of active caches that can cache the pages which are still not requested by the user. The application of pre-fetching technology in the web can greatly reduce the waiting time after users have sent their requests. This paper brings forward an intelligent technique of web pre-fetching, which can speed up fetching web pages. In this technique, we use a simplified WWW data model to represent the data in the cache of web browser to mine the association rules. We store these rules in a knowledge base so as to(74)the user's actions. In the client sides, the agents are responsible for mining the users' interest and pre-fetching the web pages, which are based on the interest association repository. Therefore it is(75)for the users to speed up the browsing.A.interactiveB.interactionC.interactivityD.infection

考题 Which two UTM features require a license to be activated? ()(Choose two.) A. antispamB. antivirus (full AV)C. content filteringD. Web-filtering redirect

考题 Which three of the following are valid CRS deployment scenarios? ()A、High Availability CRS Engines running on hardware from different server classes B、High Availability CRS Engines running on similar hardware from the same server class but from different vendors C、High Availability CRS Engines and database and a simplex Recording Server D、High Availability CRS Engines and four simplex VoIP Monitoring Servers E、CCM co-resident deployment on an MCS 7815

考题 A web browser need NOT always perform a complete request for a particular page that it suspects mightNOT have changed. The HTTP specification provides a mechanism for the browser to retrieve only a partialresponse from the web server; this response includes information, such as the Last-Modified date but NOTthe body of the page. Which HTTP method will the browser use to retrieve such a partial response?()A、GETB、ASKC、SENDD、HEADE、TRACE

考题 Which of the following web browser features deters users from visiting spoofed sites?()A、Anti-malware detectionB、Anti-phishing filtersC、Anti-spyware filtersD、Antivirus engines

考题 ()are web sites that search the web for occurrences of a specified word or phrase.A、InternetB、WWWC、JavaD、Search engines

考题 Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()A、Intrusion detectionB、VirtualizationC、KitingD、Cloning

考题 Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()A、net viewB、ipconfigC、digD、ifconfig

考题 A customer wants to have employees work from remote locations as well as in the office.  All communications must be secure and files must be protected from access by unauthorized people.  The employee’s applications (database inserts and reads) are only accessed with a web browser.  Which of the following capabilities is necessary?()A、SSLB、PGPC、File encryption programD、Public key encryption

考题 You are creating a web form with this HTML: 11. 12. 13. 14. 15. Which HTTP method is used when sending this request from the browser?()A、GETB、PUTC、POSTD、SENDE、FORM

考题 Which two UTM features require a license to be activated? ()(Choose two.)A、antispamB、antivirus (full AV)C、content filteringD、Web-filtering redirect

考题 Your network contains a Web server named Server1 that runs Windows Server 2003 and Internet Information Server (IIS). Server1 has a server certificate from an Enterprise Certificate Authority (CA) installed. External users report that when they try to access the Web site from outside the corporate network by using a Web browser, they receive the following warning message: There is a problem with this Web sites security certificate. The security certificate presented by this Web site was not issued by a trusted certificate authority. You find that users onthe corporate network do not receive this error. You need to ensure that external users do not receive the warning message when connecting to Server1.   What should you do?()A、In IIS Manager, enable the Enable client certificate mapping option.B、In IIS Manager, replace the certificate with a certificate obtained from a public Certification Authority.C、In Local Security Policy, enable Domain Member: Require strong (Windows 2000 or later) session key.D、In Local Security Policy, enable Domain Member: Digitally encrypt or sign secure channel data (always).

考题 单选题Examine the following items, which one offers a variety of security solutions, including firewall, IPS, VPN,antispyware, antivirus, and antiphishing features?()A Cisco IOS routerB Cisco PIX 500 series security applianceC Cisco 4200 series IPS applianceD Cisco ASA 5500 series security appliance

考题 单选题Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()A net viewB ipconfigC digD ifconfig

考题 单选题You are creating a web form with this HTML: 11. 12. 13. 14. 15. Which HTTP method is used when sending this request from the browser?()A GETB PUTC POSTD SENDE FORM

考题 单选题A virus has been removed from the user’s machine, but the user still cannot access the Internet.Which of the following should the technician check NEXT?()A Disable port forwarding on the router.B Reboot to Safe Mode and see if the Internet is accessible.C Format the machine and reinstall the OS.D Check the web browser’s proxy settings.

考题 单选题Which of the following features would hide internal IP addresses from the Internet?()A Network Address TranslationB Port forwardingC Quality of ServiceD SSID broadcast

考题 单选题Which of the following statements is true according to the passage?A The address system was used to make web pages.B The World Wide Web was created in Switzerland.C The fist web browser was very expensive to buyD Many people could use the Internet before 1990

考题 单选题Your network contains a Web server named Server1 that runs Windows Server 2003 and Internet Information Server (IIS). Server1 has a server certificate from an Enterprise Certificate Authority (CA) installed. External users report that when they try to access the Web site from outside the corporate network by using a Web browser, they receive the following warning message: There is a problem with this Web sites security certificate. The security certificate presented by this Web site was not issued by a trusted certificate authority. You find that users onthe corporate network do not receive this error. You need to ensure that external users do not receive the warning message when connecting to Server1.   What should you do?()A In IIS Manager, enable the Enable client certificate mapping option.B In IIS Manager, replace the certificate with a certificate obtained from a public Certification Authority.C In Local Security Policy, enable Domain Member: Require strong (Windows 2000 or later) session key.D In Local Security Policy, enable Domain Member: Digitally encrypt or sign secure channel data (always).

考题 单选题Which of the following steps does a customer use to upgrade the firmware on the AMM to the latest level?()A Open a Web browser and log on to the IMM; in the navigation frame, click IMM Firmware Update under IMM Control; click Browse; select the .exe file; click the Upgrade/Update button B TFTP to the AMM; from the Main Menu, select Update; browse to the downloaded .exe file C Telnet to AMM; from the Main Menu, select Update; browse to the downloaded .pkt file D Open a Web browser and log on to the AMM; in the navigation frame, click AMM Firmware Update under AMM Control; click Browse; select the .pkt file; click the Upgrade/Update button

考题 多选题Which three of the following are valid CRS deployment scenarios? ()AHigh Availability CRS Engines running on hardware from different server classesBHigh Availability CRS Engines running on similar hardware from the same server class but from different vendorsCHigh Availability CRS Engines and database and a simplex Recording ServerDHigh Availability CRS Engines and four simplex VoIP Monitoring ServersECCM co-resident deployment on an MCS 7815

考题 单选题()are web sites that search the web for occurrences of a specified word or phrase.A InternetB WWWC JavaD Search engines

考题 单选题Which of the following features sets IBM apart from competitors in the area of partitioning?()A Software supportB Hardware isolationC Static changes in partitionsD Micro-Partitioning

考题 单选题Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address.  Which of the following tools would allow the administrator to test name resolution?()A  net viewB  ipconfigC  digD  ifconfig

考题 单选题A customer wants to have employees work from remote locations as well as in the office.  All communications must be secure and files must be protected from access by unauthorized people.  The employee’s applications (database inserts and reads) are only accessed with a web browser.  Which of the following capabilities is necessary?()A SSLB PGPC File encryption programD Public key encryption

考题 单选题Your network contains a stand-alone certification authority (CA) and a Web server. The Web server hosts a secure Web site. The Web site uses a server certificate that was issued from the CA. Users report that they receive a certificate warning message when they connect to the Web site. You need to prevent users from receiving the certificate warning message when they connect to the Web site. What should you do from the Internet Options in Internet Explorer?()A Import the CA certificate to the trusted root CA certificate store. B Import the server authentication certificate to the trusted publishers certificate store.C Clear the Check for publisher's certificate revocation check box. D Clear the Require server verification (https:) for all sites in this zone check box for the Trusted sites zone.

考题 单选题A web browser need NOT always perform a complete request for a particular page that it suspects mightNOT have changed. The HTTP specification provides a mechanism for the browser to retrieve only a partialresponse from the web server; this response includes information, such as the Last-Modified date but NOTthe body of the page. Which HTTP method will the browser use to retrieve such a partial response?()A GETB ASKC SENDD HEADE TRACE