题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-10-23 03:51:36

[单项选择]Which software-based security threat is typically spread from user to user via e-mail?()
A. Data interception
B. Virus
C. Trojan horse
D. Denial of service

更多"Which software-based security threa"的相关试题:

[单项选择]Which software-based security threat is typically spread from user to user via e-mail?()
A. Virus
B. Trojan horse
C. Denial of service
D. Data interception
[单项选择]A SONET network typically uses which of the following transmission media?()
A. Single-mode fiber
B. Multimode fiber
C. Copper
D. Wireless
[单项选择]Which sport is regarded as typically English
A. Basketball
B. Football
C. Cricket
D. Tennis
[多项选择]Which two static routes are typically configured on your router when a Routed 1483 network is grouping ATM PVCs into alarge subnet?()
A. host route
B. default route
C. customer network
D. ISP’s routing domain
[单项选择]Which of the following components is typically used for voice transmissions and has a 10Mbpsmaximum transfer speed?()
A. 110 block
B. Patch panel
C. Vertical cross connect
D. 66 block
[单项选择]Which of the following interfaces are typically supported on the input side of a KVM switch?()
A. PS/2, VGA, USB
B. DB25, DB9, PS/2
C. PS/2, DB9, USB
D. PS/2, DB25, VGA
[单项选择]Which of the following is typically used In an LAN environment?()
A. 10GBase-SW
B. 10GBase-LW
C. 10GBase-SR
D. 10GBase-EW
[单项选择]Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()
A. Update antivirus definitions
B. MAC filtering
C. Effective security policies
D. User awareness training
[单项选择]Which of the following wireless security techniques is the MOST secure?()
A. Enable Wired Equivalent Privacy
B. Disable SSID broadcast
C. Enable Wi-Fi Protected Access
D. Enable MAC filtering
[多项选择]Which two statements about Cisco Security Management Suite are correct?()
A. It should be implemented in a management VLAN.
B. Its connection to managed devices should be over a data VLAN.
C. It is made up of Cisco Security MARS and Clean Access software.
D. It should be deployed as close to the edge of the network as possible.
E. It delivers policy administration and enforcement for the Cisco Self-Defending Network.
[单项选择]Which security or functional zone name has special significance to the Junos OS?()
A. self
B. trust
C. untrust
D. junos-global
[多项选择]Which three security concerns can be addressed by a tunnel mode IPSec VPN secured by AH?()(Choose three.)
A. data integrity
B. data confidentiality
C. data authentication
D. outer IP header confidentiality
E. outer IP header authentication
[单项选择]Which cisco security product line uses deep inspection to identify and prevent malicious attacks, resource misuse, and unauthorized access?()
A. VPN
B. NAC
C. IPS
D. MARS
[单项选择]Which IPsec security protocol should be used when confidentiality is required?()
A. AH
B. MB5
C. PSK
D. ESP

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码