网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which security mechanism can be directed through the
- A、 authorization
- B、 data integrity
- C、 confidentiality
- D、 authentication
参考答案
更多 “Which security mechanism can be directed through the element in a web deployment descriptor()?A、 authorizationB、 data integrityC、 confidentialityD、 authentication” 相关考题
考题
One solution to major security problems is ______, which are frequently installed to fix known security holes.A.patchesB.compensationsC.complementsD.additions
考题
_______means the level for which appropriate additional protective security measures shall be maintained for a period of time as a result of heightened risk of a security incident.A.Security level 1B.Security level 2C.Security level 3D.Security level 4
考题
At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)
A. [edit security idp]B. [edit security zones security-zone trust interfaces ge-0/0/0.0]C. [edit security zones security-zone trust]D. [edit security screen]
考题
Which statement describes a security zone?()
A. A security zone can contain one or more interfaces.B. A security zone can contain interfaces in multiple routing instances.C. A security zone must contain two or more interfaces.D. A security zone must contain bridge groups.
考题
A network vulnerability scanner is part of which critical element of network and system security?()
A. host securityB. perimeter securityC. security monitoringD. policy management
考题
Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()A、 Cisco SDM Security AuditB、 Cisco Security MARSC、 Cisco Security Agent MCD、 Cisco Security IntelliShieldE、 CAN
考题
The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()A、 security contextsB、- transparent firewallC、 WebVPND、 Active/Active failoverE、 low latency queuingF、 AIP-SSM intrusion prevention
考题
During which phase of the Steps to Success methodology for Cisco SMB Security Solutions would the Security Technology Requirements document be used to determine a customer’s security requirements?()A、PerformB、PositionC、DevelopD、PrepareE、PlanF、Design
考题
Which of the following is BEST for providing network security?()A、FirewallB、DMZC、SwitchD、IDS
考题
Which of the following are examples of physical security measures?()A、Policies and proceduresB、EncryptionC、Locked doorsD、Security personnelE、Backup tapes
考题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS
考题
A System p administrator is investigating a possible security breech and wants to review information about failed login attempts to the system. Which of the following commands will show this()A、fwtmp /etc/security/failedloginB、cat /etc/security/failedloginC、whoD、alog -f /etc/security/failedlogin -o
考题
Which menu option must be used to grant a user the authority to add or remove users to one or more Security Groups?()A、 Security ControlsB、 Database AccessC、 Set Security ProfileD、 Authorize Group Reassignment
考题
Which file contains the attributes used to setup a new user account when executing ‘mkuser’ without any flags?()A、/etc/security/userB、/etc/security/passwdC、/etc/security/mkuser.sysD、/etc/security/mkuser.default
考题
Which of the following options should be used to obtain the latest security patches for AIX?()A、FixDistB、The Bonus Pack CDC、OPSD、The Security Maintenance CD
考题
A System p administrator needs to set the default password length for all users to six characters. Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user
考题
At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)A、[edit security idp]B、[edit security zones security-zone trust interfaces ge-0/0/0.0]C、[edit security zones security-zone trust]D、[edit security screen]
考题
You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()A、Microsoft Baseline Security Analyzer (MBSA)B、Microsoft Security Assessment Tool (MSAT)C、Resultant Set of Policy (RSoP)D、Security Configuration Wizard (SCW)
考题
单选题Which menu option must be used to grant a user the authority to add or remove users to one or more Security Groups?()A
Security ControlsB
Database AccessC
Set Security ProfileD
Authorize Group Reassignment
考题
单选题Which statement describes a security zone?()A
A security zone can contain one or more interfaces.B
A security zone can contain interfaces in multiple routing instances.C
A security zone must contain two or more interfaces.D
A security zone must contain bridge groups.
考题
单选题A network vulnerability scanner is part of which critical element of network and system security?()A
host securityB
perimeter securityC
security monitoringD
policy management
考题
单选题A System p administrator needs to set the default password length for all users to six characters. Which of the following files needs to be edited to accomplish this ()A
/etc/security/limitsB
/etc/security/mkuser.sysC
/etc/security/privD
/etc/security/user
考题
单选题Which command do you use to display the status of an antivirus database update?()A
show security utm anti-virus statusB
show security anti-virus database statusC
show security utm anti-virus databaseD
show security utm anti-virus update
考题
多选题At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)A[edit security idp]B[edit security zones security-zone trust interfaces ge-0/0/0.0]C[edit security zones security-zone trust]D[edit security screen]
考题
单选题Which operational mode command displays all active IPsec phase 2 security associations?()A
show ike security-associationsB
show ipsec security-associationsC
show security ike security-associationsD
show security ipsec security-associations
考题
多选题Which two commands can be used to monitor firewall user authentication?()Ashow access firewall-authenticationBshow security firewall-authentication usersCshow security audit logDshow security firewall-authentication history
考题
单选题Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()A
Cisco SDM Security AuditB
Cisco Security MARSC
Cisco Security Agent MCD
Cisco Security IntelliShieldE
CAN
考题
单选题Which CLI command provides a summary of what the content-filtering engine has blocked?()A
show security utm content-filtering statisticsB
show security flow sessionC
show security flow statisticsD
show security utm content-filtering summary
热门标签
最新试卷