站内搜索
BR0-001 问题列表
问题
单选题If a user attempts to go to a website and notices the URL has changed, which of the following attacks is MOST likely the cause?()A
DLL injectionB
DDoS attackC
DNS poisoningD
ARP poisoning
问题
单选题An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()A
NIPSB
HoneypotC
DMZD
NIDS
问题
单选题Which of the following specifies a set of consistent requirements for a workstation or server?()A
Vulnerability assessmentB
Imaging softwareC
Patch managementD
Configuration baseline
问题
单选题Which of the following encryption methods is often used along with L2TP?()A
S/MIMEB
SSHC
3DESD
IPSec
问题
单选题Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A
The cell phone should require a password after a set period of inactivity.B
The cell phone should only be used for company related emails.C
The cell phone data should be encrypted according to NIST standards.D
The cell phone should have data connection abilities disabled.
问题
单选题Which of the following requires an update to the baseline after installing new software on a machine?()A
Signature-based NIPSB
Signature-based NIDSC
HoneypotD
Behavior-based HIDS
问题
单选题Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()A
Protocol analyzerB
Vulnerability scannerC
Port scannerD
Penetration test
问题
单选题Which of the following describes a static NAT?()A
A static NAT uses a one to many mapping.B
A static NAT uses a many to one mapping.C
A static NAT uses a many to many mapping.D
A static NAT uses a one to one mapping.
问题
单选题If a user attempts to go to a website and notices the URL has changed, which of the following attacks is MOST likely the cause?()A
DLL injectionB
DDoS attackC
DNS poisoningD
ARP poisoning
问题
单选题An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()A
NIPSB
HoneypotC
DMZD
NIDS
问题
单选题Which of the following specifies a set of consistent requirements for a workstation or server?()A
Vulnerability assessmentB
Imaging softwareC
Patch managementD
Configuration baseline
问题
单选题Which of the following encryption methods is often used along with L2TP?()A
S/MIMEB
SSHC
3DESD
IPSec
问题
单选题Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A
The cell phone should require a password after a set period of inactivity.B
The cell phone should only be used for company related emails.C
The cell phone data should be encrypted according to NIST standards.D
The cell phone should have data connection abilities disabled.
问题
单选题Which of the following requires an update to the baseline after installing new software on a machine?()A
Signature-based NIPSB
Signature-based NIDSC
HoneypotD
Behavior-based HIDS
问题
单选题Which of the following would an attacker use to footprint a system?()A
RADIUSB
Password crackerC
Port scannerD
Man-in-the-middle attack