网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which software-based security threat is typically spread from user to user via e-mail?()
A
Data interception
B
Virus
C
Trojan horse
D
Denial of service
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which software-based security threat is typically spread from user to user via e-mail?()A Data interceptionB VirusC Trojan horseD Denial of service” 相关考题
考题
What information does the Junos Pulse Access Control Service provide to Security Threat Response Manager (STRM)?()
A. Session lengthB. User browser informationC. Session IP addressD. User identity information
考题
Which software-based security threat is typically spread from user to user via e-mail?()
A.Data interceptionB.VirusC.Trojan horseD.Denial of service
考题
Which form of DSL technology is typically used as a replacement for T1 lines?()A、VDSLB、HDSLC、ADSLD、SDSL
考题
Which three critical elements does the Cisco Integrated Security Solution incorporate?()A、Cisco Storage SolutionB、Cisco Threat Defense SolutionC、Cisco Trust and Identity Management SolutionD、Cisco Switching SolutionE、Cisco Content Networking SolutionF、Cisco Secure Connectivity
考题
All-in-one UTM security gateways are starting to displace routers in many small business networks. What does UTM stand for?()A、 United Threat MonitorB、 Universal Threat ManagerC、 Unified Threat ManagementD、 Ultimate Threat Monitoring
考题
Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()A、 Cisco SDM Security AuditB、 Cisco Security MARSC、 Cisco Security Agent MCD、 Cisco Security IntelliShieldE、 CAN
考题
What are three characteristics that buyers of Cisco Small Business routers typically look for?()A、 basic security optionsB、 simple network configurationC、 advanced network configurationD、 integrated solutionsE、 advanced security optionsF、 point products
考题
What are three benefits of the Cisco Adaptive Threat Defense strategy? (Choose three.) ()A、 using QoS techniques such as Traffic Policing to rate limit suspected traffic to prevent DoS attacksB、 automatic reconfiguration s of the security devices based on current security threatsC、 containment and control of security threatsD、 application securityE、 anti-x defense F- virtual firewall
考题
What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()A、The ability to detect and prevent malicious traffic.B、The ability to associate security breaches with a specific user.C、Converged management of network and security events, network flow data, and identity information.D、Consistent device management across administrative realms.
考题
The Cisco Unified Wireless Network minimizes the TCO and maximizes woreless network uptime by optimizing which two deployment, management, and security features?()A、 unified wireless and wired infrastructure for a single point of control for all WLAN trafficB、 simplified management of central or remotely located access pointsC、 extension features to wired network services, such as denial of service prevention and ACLsD、 threat defense with a robust wired IDS
考题
Which of the following are examples of physical security measures?()A、Policies and proceduresB、EncryptionC、Locked doorsD、Security personnelE、Backup tapes
考题
A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A、WormB、SmurfC、Logic BombD、Man-in-the-middle
考题
单选题Which of the following is typically collected during the server baselining process?()A
The vendor documentation and knowledgebaseB
Compliance of local lawsC
Server performance statisticsD
Microsoft Baseline Security Analyzer output
考题
多选题What are three benefits of the Cisco Adaptive Threat Defense strategy? (Choose three.) ()Ausing QoS techniques such as Traffic Policing to rate limit suspected traffic to prevent DoS attacksBautomatic reconfiguration s of the security devices based on current security threatsCcontainment and control of security threatsDapplication securityEanti-x defense F- virtual firewall
考题
单选题Fire may be spread by which means?()A
Conduction of heat to adjacent surfacesB
Direct radiationC
ConvectionD
All of the above
考题
单选题When the ship security alert system is activated, it shall not()A
initiate a ship-to-shore security alertB
transmit a ship-to-shore security alertC
initiate an alert identifying the ship, its locationD
raise a security alarm on-board the ship indicating that the ship is under threat
考题
单选题Which statement accurately describes firewall user authentication?()A
Firewall user authentication provides another layer of security in a network.B
Firewall user authentication provides a means for accessing a JUNOS Software-based security device.C
Firewall user authentication enables session-based forwarding.D
Firewall user authentication is used as a last resort security method in a network.
考题
单选题Which software-based security threat is typically spread from user to user via e-mail?()A
Data interceptionB
VirusC
Trojan horseD
Denial of service
考题
多选题List three benefits of implementing an integrated security solution based on the Cisco Self- Defending Network strategy? (Choose three.)()Aintegrated securityBcollaborative security systemCself provisioningDAdaptive Threat DefenseEprogrammable security ASICsFCisco lOS-based security
考题
多选题What information does the Junos Pulse Access Control Service provide to Security Threat Response Manager (STRM)?()ASession lengthBUser browser informationCSession IP addressDUser identity information
考题
多选题Which three critical elements does the Cisco Integrated Security Incorporate?()ACisco Trust and Identity Management SolutionBCisco Secure Connectivity SolutionCCisco Threat Defense SolutionDCisco Switching SolutionECisco Storage SolutionFCisco Content Networking Solution
考题
单选题Which type of security will allow businesses to focus on achieving business goals?()A
point-product securityB
endpointsecurityC
network infrastructure securityD
secure access and threat defense
考题
单选题All-in-one UTM security gateways are starting to displace routers in many small business networks. What does UTM stand for?()A
United Threat MonitorB
Universal Threat ManagerC
Unified Threat ManagementD
Ultimate Threat Monitoring
考题
单选题Which operational mode command displays all active IPsec phase 2 security associations?()A
show ike security-associationsB
show ipsec security-associationsC
show security ike security-associationsD
show security ipsec security-associations
考题
单选题In order to communicate the threat at a port facility or for a ship, the Contracting Government will set the appropriate security levels Security level 1 corresponds to()A
normal situationsB
medium situationsC
high threat situationsD
special situations
考题
多选题What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()AThe ability to detect and prevent malicious traffic.BThe ability to associate security breaches with a specific user.CConverged management of network and security events, network flow data, and identity information.DConsistent device management across administrative realms.
考题
单选题Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()A
Cisco SDM Security AuditB
Cisco Security MARSC
Cisco Security Agent MCD
Cisco Security IntelliShieldE
CAN
考题
多选题What are three characteristics that buyers of Cisco Small Business routers typically look for?()Abasic security optionsBsimple network configurationCadvanced network configurationDintegrated solutionsEadvanced security optionsFpoint products
热门标签
最新试卷