网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()
- A、Update antivirus definitions
- B、MAC filtering
- C、Effective security policies
- D、User awareness training
参考答案
更多 “Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()A、Update antivirus definitionsB、MAC filteringC、Effective security policiesD、User awareness training” 相关考题
考题
Which command do you use to display the status of an antivirus database update?()
A. show security utm anti-virus statusB. show security anti-virus database statusC. show security utm anti-virus databaseD. show security utm anti-virus update
考题
A user states that their work PC has become infected with a virus. Which of the following shouldthe technician do FIRST?()
A. Perform an antivirus program scanB. Boot the machine into Safe ModeC. Remove the machine from the networkD. Check for system security patches
考题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS
考题
A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()
A. WEPB. Port filteringC. WPAD. Longer SSID broadcast intervals
考题
Which of the following security threats are MOST likely prevented through user training?()
A. Network IntrusionB. Adware PopupsC. Social EngineeringD. Spam Messages
考题
Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()
A.Update antivirus definitionsB.MAC filteringC.Effective security policiesD.User awareness training
考题
Which of the following is NOT true of security attacks?[A] Employees will keep up with security polices and awareness if they are highly-trained.[B] The rate of security attacks appears faster than the growth of the Internet.[C] One's computer system will never be secure.[D] Vulnerabilities can go through phones, wireless devices, and network appliances
考题
The Company is concerned about Layer 2 security threats. Which statement is true about these threats? ()A、 MAC spoofing attacks allow an attacking device to receive frames intended for a different network host.B、 Port scanners are the most effective defense against dynamic ARP inspection.C、 MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable attack points.D、 Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP snooping attacks.E、 DHCP snooping sends unauthorized replies to DHCP queries.F、 ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.G、 None of the other alternatives apply.
考题
A user states that their work PC has become infected with a virus. Which of the following shouldthe technician do FIRST?()A、Perform an antivirus program scanB、Boot the machine into Safe ModeC、Remove the machine from the networkD、Check for system security patches
考题
In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A、A public place where guests are free to access the wireless network.B、A small office where a defined number of specific wireless devices are used.C、A meeting room where various company users will access the wireless network during meetings. D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.
考题
Which of the following is the MOST important consideration when implementing a data retentio program?()A、 The data destruction requirementsB、 The user awareness training programC、 The laws and legal requirements of the dataD、 The companys individual data retention policies
考题
A technician works for a company that has recently been affected by a virus. The virus entered the network by using port 6000. Port 6000 is used by an application located on a server. The technician has been asked to block this port on all servers and computers except for the one server which uses this port. Which of the following should the technician do?()A、Update the antivirus applicationB、Install critical update security patchesC、Adjust the software firewall settingsD、Replace the current antivirus program
考题
Which command do you use to display the status of an antivirus database update?()A、show security utm anti-virus statusB、show security anti-virus database statusC、show security utm anti-virus databaseD、show security utm anti-virus update
考题
Which of these user ICAP?()A、 anti-malware scanningB、 data loss prevention policesC、 decryption policiesD、 CiscoIronPort Data Security policies
考题
You are responsible for increasing the security within the Company LAN. Of the following choices listed below, which is true regarding layer 2 security and mitigation techniques? ()A、 Enable root guard to mitigate ARP address spoofing attacks.B、 Configure DHCP spoofing to mitigate ARP address spoofing attacks.C、 Configure PVLANs to mitigate MAC address flooding attacks.D、 Enable root guard to mitigate DHCP spoofing attacks.E、 Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted ports.F、 Configure port security to mitigate MAC address flooding G、 None of the other alternatives apply
考题
A user has a new network printer they want setup in their home. The user wants all their PCs aswell as any guests with laptops to be able to print to it. Which of the following connection methods would be the MOST effective for meeting these requirements?()A、802.11gB、USBC、EthernetD、BluetoothE、Serial
考题
A user attempts to login to a bookmarked site but is prompted for their social security number,mother’s maiden name and date of birth. Which of the following has MOST likely happened?()A、The website has updated the security policies.B、The user’s identity has been stolen.C、The browser has been hijacked.D、The user typed the website address incorrectly.
考题
A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()A、WEPB、Port filteringC、WPAD、Longer SSID broadcast intervals
考题
Which of the following security threats are MOST likely prevented through user training?()A、Network IntrusionB、Adware PopupsC、Social EngineeringD、Spam Messages
考题
Which of the following wireless security techniques is the MOST secure?()A、Enable Wired Equivalent PrivacyB、Disable SSID broadcastC、Enable Wi-Fi Protected AccessD、Enable MAC filtering
考题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS
考题
单选题Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()A
Update antivirus definitionsB
MAC filteringC
Effective security policiesD
User awareness training
考题
单选题The Company is concerned about Layer 2 security threats. Which statement is true about these threats? ()A
MAC spoofing attacks allow an attacking device to receive frames intended for a different network host.B
Port scanners are the most effective defense against dynamic ARP inspection.C
MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable attack points.D
Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP snooping attacks.E
DHCP snooping sends unauthorized replies to DHCP queries.F
ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.G
None of the other alternatives apply.
考题
单选题In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A
A public place where guests are free to access the wireless network.B
A small office where a defined number of specific wireless devices are used.C
A meeting room where various company users will access the wireless network during meetings. D
An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.
考题
单选题Which of the following is the MOST important consideration when implementing a data retentio program?()A
The data destruction requirementsB
The user awareness training programC
The laws and legal requirements of the dataD
The companys individual data retention policies
考题
多选题A user has a new network printer they want setup in their home. The user wants all their PCs aswell as any guests with laptops to be able to print to it. Which of the following connection methods would be the MOST effective for meeting these requirements?()A802.11gBUSBCEthernetDBluetoothESerial
考题
单选题Which of these user ICAP?()A
anti-malware scanningB
data loss prevention policesC
decryption policiesD
CiscoIronPort Data Security policies
热门标签
最新试卷