网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()
A
Protocol analyzer
B
Vulnerability scanner
C
Port scanner
D
Penetration test
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()A Protocol analyzerB Vulnerability scannerC Port scannerD Penetration test” 相关考题
考题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS
考题
Which of the following is the LEAST intrusive?()
A. Firmware updateB. Remote management cardC. Diagnostic LEDsD. Multimeter
考题
Which of the following monitors a server to see which protocols might be in use?()
A. Ping sweepB. Intrusion detection softwareC. Port scannerD. Wireless packet sniffer
考题
Which of the following is the BEST way to allow web software through the server firewall?()
A. Implement an application exception.B. Implement an access control list (ACL).C. Open the corporate firewall to allow port 80.D. Implement port blocking on port 80.
考题
Examine the following options,which Spanning Tree Protocol (STP) protection mechanism disables aswitch port if the port receives a Bridge Protocol Data Unit (BPDU)?()A、Uplink FastB、Port FastC、BPDU GuardD、Root Guard
考题
Which of the following allows a program or port through a software firewall?()A、ExceptionB、Pass-throughC、Port-forwardingD、Punch-through
考题
Which of the following monitors a server to see which protocols might be in use?()A、Ping sweepB、Intrusion detection softwareC、Port scannerD、Wireless packet sniffer
考题
Which of the following is the EASIEST way to centrally deploy software?()A、Network shareB、PXEC、USBD、Optical media
考题
Which of the following is the BEST way to allow web software through the server firewall?()A、Implement an application exception.B、Implement an access control list (ACL).C、Open the corporate firewall to allow port 80.D、Implement port blocking on port 80.
考题
Which of the following would an attacker use to footprint a system?()A、RADIUSB、Password crackerC、Port scannerD、Man-in-the-middle attack
考题
An administrator is planning an upgrade of a major software package on an application server.The software has been tested successfully in a test environment and it is ready to go into production. Which of the following steps should the administrator take next?()A、Identify necessary operating system updatesB、Implement the changeC、Document the changeD、Schedule system down time
考题
Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()A、Protocol analyzerB、Vulnerability scannerC、Port scannerD、Penetration test
考题
Which of the following is the LEAST intrusive?()A、Firmware updateB、Remote management cardC、Diagnostic LEDsD、Multimeter
考题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS
考题
Your database is not configured for session failover. Your tnsnames.ora file contains the following details: test.us.oracle.com= (DESCRIPTION= (ADDRESS_LIST= (LOAD_BALANCE=off) (FAILOVER=ON) (ADDRESS= (PROTOCOL=tcp)(HOST=test1-server)(PORT=1521)) (ADDRESS= (PROTOCOL=tcp)(HOST=test2-server)(PORT=1521))) (CONNECT_DATA= (SERVICE_NAME=test.us.oracle.com))) Which feature is enabled in this case?()A、Load balancingB、Instance failoverC、Database failoverD、Connect-time failoverE、Transparent Application Failover (TAF)
考题
单选题Which of the following is the BEST way to allow web software through the server firewall?()A
Implement an application exception.B
Implement an access control list (ACL).C
Open the corporate firewall to allow port 80.D
Implement port blocking on port 80.
考题
单选题Which of the following should Karen, a technician, use to test a parallel port?()A
Line testerB
MultimeterC
Null modem cableD
Loopback plugs
考题
单选题Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()A
Protocol analyzerB
Vulnerability scannerC
Port scannerD
Penetration test
考题
单选题Your database is not configured for session failover. Your tnsnames.ora file contains the following details: test.us.oracle.com= (DESCRIPTION= (ADDRESS_LIST= (LOAD_BALANCE=off) (FAILOVER=ON) (ADDRESS= (PROTOCOL=tcp)(HOST=test1-server)(PORT=1521)) (ADDRESS= (PROTOCOL=tcp)(HOST=test2-server)(PORT=1521))) (CONNECT_DATA= (SERVICE_NAME=test.us.oracle.com))) Which feature is enabled in this case?()A
Load balancingB
Instance failoverC
Database failoverD
Connect-time failoverE
Transparent Application Failover (TAF)
考题
单选题For the following ports, which port is on every bridge in a Spanning Tree Protocol IEEE 802.1w network except the root bridge?()A
root portB
backup portC
designated portD
alternate port
考题
单选题An administrator is planning an upgrade of a major software package on an application server.The software has been tested successfully in a test environment and it is ready to go into production. Which of the following steps should the administrator take next?()A
Identify necessary operating system updatesB
Implement the changeC
Document the changeD
Schedule system down time
考题
单选题Which of the following is the EASIEST way to centrally deploy software?()A
Network shareB
PXEC
USBD
Optical media
考题
单选题An administrator is planning an upgrade of a major software package on an application server. The software has been tested successfully in a test environment and it is ready to go into production. Which of the following steps should the administrator take next?()A
Identify necessary operating system updatesB
Implement the changeC
Document the changeD
Schedule system down time
考题
单选题Which of the following is the LEAST intrusive?()A
Firmware updateB
Remote management cardC
Diagnostic LEDsD
Multimeter
考题
单选题An administrator is planning an upgrade of a major software package on an application server.The software has been identified, the project approved and the upgrade purchased. Which of the following steps should the administrator take NEXT?()A
Create a test environment for the new version.B
Determine system requirements for the upgrade.C
Request bids from other competing vendors in the product space.D
Document the upgrade.
考题
单选题Which of the following is the EASIEST way to centrally deploy software?()A
Network shareB
PXEC
USBD
Optical media
考题
单选题Which of the following allows a program or port through a software firewall?()A
ExceptionB
Pass-throughC
Port-forwardingD
Punch-through
考题
单选题Examine the following options,which Spanning Tree Protocol (STP) protection mechanism disables aswitch port if the port receives a Bridge Protocol Data Unit (BPDU)?()A
Uplink FastB
Port FastC
BPDU GuardD
Root Guard
热门标签
最新试卷