网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which key method is used to detect and prevent attacks by use of IDS and/or IPS technologies?()

  • A、Signature-based detection
  • B、Anomaly-based detection
  • C、Honey pot detection
  • D、Policy-based detection

参考答案

更多 “Which key method is used to detect and prevent attacks by use of IDS and/or IPS technologies?()A、Signature-based detectionB、Anomaly-based detectionC、Honey pot detectionD、Policy-based detection” 相关考题
考题 Which of the following conditions will make a relation that is in first normal form. to be in second normal form?Ⅰ.every non-key attribute is functionally dependent on the full set of primary key attributes.Ⅱ.no non-key attributes exist in the relation.Ⅲ.the primary key consists of only one attribute.A.Ⅰ onlyB.Ⅰ and Ⅱ onlyC.Ⅰ and Ⅲ onlyD.any of them

考题 Which encryption type is used to secure user data in an IPsec tunnel?() A. symmetric key encryptionB. asymmetric key encryptionC. RSAD. digital certificates

考题 Which statement describes the UTM licensing model?() A. Install the license key and all UTM features will be enabled for the life of the productB. Install one license key per feature and the license key will be enabled for the life of the product.C. Install one UTM license key, which will activate all UTM features; the license will need to be renewed when it expires.D. Install one UTM license key per UTM feature; the licenses will need to be renewed when they expire.

考题 Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?()A、A session key value is exchanged across the network.B、A session key never passes across the network.C、A session key is used as the key for asymmetric data encryption.D、A session key is used as the key for symmetric data encryption.

考题 Which of the following is a key component of a directory services server?()A、 VPNB、 RISC、 LDAPD、 RAS

考题 Which two statements about the Diffie-Hellman (DH) key exchange process are correct?()A、In the DH key exchange process, the session key is never passed across the network.B、In the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.C、In the DH key exchange process, the session key is passed across the network to the peer for confirmation.D、In the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security

考题 Which statement describes the UTM licensing model?()A、Install the license key and all UTM features will be enabled for the life of the productB、Install one license key per feature and the license key will be enabled for the life of the product.C、Install one UTM license key, which will activate all UTM features; the license will need to be renewed when it expires.D、Install one UTM license key per UTM feature; the licenses will need to be renewed when they expire.

考题 Which two statements regarding asymmetric key encryption are true?()A、The same key is used for encryption and decryption.B、It is commonly used to create digital certificate signatures.C、It uses two keys: one for encryption and a different key for decryption.D、An attacker can decrypt data if the attacker captures the key used for encryption

考题 Which two statements are true about the primary key constraint in a table? ()A、It is not possible to disable the primary key constraint.B、It is possible to have more than one primary key constraint in a single table.C、The primary key constraint can be referred by only one foreign key constraint.D、The primary key constraint can be imposed by combining more than one column.E、The non-deferrable primary key constraint creates an unique index on the primary key column if it is not already indexed.

考题 Which two statements are true about a bitmap index? ()A、It is recommended for the columns that have unique values.B、It can be converted to a B-tree index by using the ALTER INDEX command.C、It has a bitmap segment for each distinct value in the key column, containing a string of bits in which each bit represents the presence or absence of a key column value.D、Updating the key column locks the whole bitmap segment that contains the bit for the key value to be updated.

考题 多选题Which three are distinctions between asymmetric and symmetric algorithms? ()AOnly symmetric algorithms have a key exchange technology built inBAsymmetric algorithms are used quite often as key exchange protocols for symmetricalgorithmsCOnly asymmetric algorithms have a key exchange technology built inDAsymmetric algorithms are based on more complex mathematical computations

考题 单选题You are developing a method to decrypt data that was encrypted with the Triple DES Algorithm. The method accepts the following parameters:  The byte array to be decrypted, which is named cipherMessage  The key, which is named key   An initialization vector, which is named iv  You need to decrypt the message by using the TripleDES class and place the result in a string.  Which code segment should you use?()A AB BC CD D

考题 单选题Which encryption type is used to secure user data in an IPsec tunnel?()A symmetric key encryptionB asymmetric key encryptionC RSAD digital certificates

考题 多选题Which two statements are true about a bitmap index? ()AIt is recommended for the columns that have unique values.BIt can be converted to a B-tree index by using the ALTER INDEX command.CIt has a bitmap segment for each distinct value in the key column, containing a string of bits in which each bit represents the presence or absence of a key column value.DUpdating the key column locks the whole bitmap segment that contains the bit for the key value to be updated.

考题 单选题Which data organization schemes are supported?()A PARTITION BY HASH and ORGANIZE BY  B PARTITION BY RANGE and ORGANIZE BY KEY SEQUENCE  C PARTITION BY HASH and ORGANIZE BY KEY SEQUENCE D PARTITION BY RANGE and ORGANIZE BY

考题 单选题Which of the following is used by BitLocker to lock an encryption key and protect data?()A ECPB IRQC AGPD TPM

考题 多选题Which two statements are true about the primary key constraint in a table? ()AIt is not possible to disable the primary key constraint.BIt is possible to have more than one primary key constraint in a single table.CThe primary key constraint can be referred by only one foreign key constraint.DThe primary key constraint can be imposed by combining more than one column.EThe non-deferrable primary key constraint creates an unique index on the primary key column if it is not already indexed.

考题 多选题Which two statements regarding symmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption.

考题 单选题Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?()A A session key value is exchanged across the network.B A session key never passes across the network.C A session key is used as the key for asymmetric data encryption.D A session key is used as the key for symmetric data encryption.

考题 多选题Which two statements about the Diffie-Hellman (DH) key exchange process are correct?()AIn the DH key exchange process, the session key is never passed across the network.BIn the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.CIn the DH key exchange process, the session key is passed across the network to the peer for confirmation.DIn the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security

考题 多选题Which two statements about the Diffie-Hellman (DH) key exchange process are correct? ()(Choose two.)AIn the DH key exchange process, the session key is never passed across the network.BIn the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.CIn the DH key exchange process, the session key is passed across the network to the peer for confirmation.DIn the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security

考题 单选题Which constraint can be defines only at the column level? ()A UNIQUEB NOT NULLC CHECKD PRIMARY KEYE FOREIGN KEY