网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
A
Honeynet
B
Honeypot
C
Vulnerability scanner
D
Network based IDS
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A HoneynetB HoneypotC Vulnerability scannerD Network based IDS” 相关考题
考题
Which of the following is BEST for providing network security?()
A.FirewallB.DMZC.SwitchD.IDS
考题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS
考题
For security reasons a network technician wants to install a Linux based email server, Microsoftweb services, and directory services on different servers.Which of the following technologies would be BEST to reduce hard ware costs?()A. VPN concentratorB. Virtual serversC. WirelessD. Multimode fiber
考题
Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()
A.IDSB.VPNC.NIPSD.HIDS
考题
A network vulnerability scanner is part of which critical element of network and system security?()
A. host securityB. perimeter securityC. security monitoringD. policy management
考题
Which of the following is NOT true of security attacks?[A] Employees will keep up with security polices and awareness if they are highly-trained.[B] The rate of security attacks appears faster than the growth of the Internet.[C] One's computer system will never be secure.[D] Vulnerabilities can go through phones, wireless devices, and network appliances
考题
Which one is the most important based on the following common elements of a network design?()A、Business needsB、Risk analysisC、Security policyD、Best practices
考题
In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A、A public place where guests are free to access the wireless network.B、A small office where a defined number of specific wireless devices are used.C、A meeting room where various company users will access the wireless network during meetings. D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.
考题
A network vulnerability scanner is part of which critical element of network and system security?()A、host securityB、perimeter securityC、security monitoringD、policy management
考题
Which two statements describe the functions and operations of IDS and IPS systems?()A、A network administrator entering a wrong password would generate a true-negative alarm.B、A false positive alarm is generated when an IDS/IPS signature is correctly identified.C、An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.D、Cisco IDS works inline and stops attacks before they enter the network.E、Cisco IPS taps the network traffic and responds after an attack.F、Profile-based intrusion detection is also known as "anomaly detection".
考题
During which phase of the steps to success methodology for Cisco SMB Security Solutions would the Network Readiness Assessment be used to assess the readiness of an existing network infrastructure and determine which,if any modification should be prior to implementation?()A、PrepareB、DesignC、PositionD、DevelopE、PlanF、Perform
考题
Which of the following is BEST for providing network security?()A、FirewallB、DMZC、SwitchD、IDS
考题
For security reasons a network technician wants to install a Linux based email server, Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hard ware costs?()A、VPN concentratorB、Virtual serversC、WirelessD、Multimode fiber
考题
Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A、IDSB、VPNC、NIPSD、HIDS
考题
Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()A、Protocol analyzerB、Vulnerability scannerC、Port scannerD、Penetration test
考题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS
考题
Which statement accurately describes firewall user authentication?()A、Firewall user authentication provides another layer of security in a network.B、Firewall user authentication provides a means for accessing a JUNOS Software-based security device.C、Firewall user authentication enables session-based forwarding.D、Firewall user authentication is used as a last resort security method in a network.
考题
单选题During which phase of the steps to success methodology for Cisco SMB Security Solutions would the Network Readiness Assessment be used to assess the readiness of an existing network infrastructure and determine which,if any modification should be prior to implementation?()A
PrepareB
DesignC
PositionD
DevelopE
PlanF
Perform
考题
单选题For security reasons a network technician wants to install a Linux based email server, Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hard ware costs?()A
VPN concentratorB
Virtual serversC
WirelessD
Multimode fiber
考题
单选题Which of the following is BEST for providing network security?()A
FirewallB
DMZC
SwitchD
IDS
考题
单选题Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A
HoneynetB
HoneypotC
Vulnerability scannerD
Network based IDS
考题
单选题In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A
A public place where guests are free to access the wireless network.B
A small office where a defined number of specific wireless devices are used.C
A meeting room where various company users will access the wireless network during meetings. D
An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.
考题
单选题A network vulnerability scanner is part of which critical element of network and system security?()A
host securityB
perimeter securityC
security monitoringD
policy management
考题
单选题Which of the following would restrict traffic from a specific host to a network?()A
MIBsB
NASC
ACLD
SMTP
考题
单选题Which statement accurately describes firewall user authentication?()A
Firewall user authentication provides another layer of security in a network.B
Firewall user authentication provides a means for accessing a JUNOS Software-based security device.C
Firewall user authentication enables session-based forwarding.D
Firewall user authentication is used as a last resort security method in a network.
考题
单选题A network vulnerability scanner is part of which critical element of network and system security?()A
host securityB
perimeter securityC
security monitoringD
policy management
考题
单选题During which phase of the steps to success methodology for Cisco SMB security solutions would the Network Readiness Assessment be used to assess the readiness of an existing network infrastructure and determine which, if any, modification should be made prior to implementation?()A
PositionB
PrepareC
DesignD
PerformE
Plan
考题
单选题Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A
IDSB
VPNC
NIPSD
HIDS
热门标签
最新试卷