更多"What is used to prevent ‘ping-pong "的相关试题:
[单项选择]A common technique used to prevent the unauthorized network devices from sending trafficacross a network is port()
A. spanning
B. address translation
C. mirroring
D. authentication
[单项选择]What is used to segment larger networks into smaller networks?()
A. supernet masks
B. subnet masks
C. wildcard masks
D. route filtering
[单项选择]Which of the following could be used to prevent an attacker from accessing the master boot drive when attaching a hard drive to another system?()
A. BIOS password
B. Domain membership
C. EFS
D. Bitlocker
[单项选择]Which BGP attribute is used by BGP to prevent routing loops?()
A. AS - path
B. next - hop
C. MED
D. weight
E. local preference
F. origin
[单项选择]What should be done to prevent insects from eating into the water harvesting system at the bottom
A. The two bags holding the water should be put inside the metal tank.
B. The inner bags need to be replaced every two years.
C. The water harvesting system should be built on a platform.
D. A cover should be used to prevent insects from eating it.
[单项选择]By what way does RealNetworks attempt to prevent Microsoft's ambitions
[单项选择]What method does PWC take to prevent their children from holding parties where they get completely intoxicated
A. Parents held talk sessions with their children in order to persuade them to give up pot smoking
B. PWC established workshops to help young people give drug and alcohol free parties.
C. PWC helped the school authorities, set up workshops of this kind.
D. They held talk sessions and invited experts to make lectures on how to give up drug taking.
[单项选择]What must an administrator do to prevent new telnet users from connecting to the system?()
A. rmdev -l /dev/pts
B. touch /etc/nologin
C. chdev -l sys0 -a nologin
D. chuser -a login=false ALL
[单项选择]What are side effects according to the passage
A. Withdrawal symptoms.
B. Overdoses.
C. Certain effects other than intended ones.
D. Sidewalk effects.
[单项选择]What is used to view status messages sent to a file named "test" as they are sent?()
A. monitor start test
B. show log test
C. view log test
D. show test realtime
[单项选择]What is the WBS typically used for
A. To organize and define the total scope of the projec
B. To identify the logical person to be project sponso
C. To define the level of reporting the seller provides the buye
D. As a record of when work elements are assigned to individual
[多项选择]What are three configuration objects used to build Junos IDP rules? ()(Choose three.)
A. zone objects
B. policy objects
C. attack objects
D. alert and notify objects
E. network and address objects
[单项选择]What term is used to describe the process where one frame is placed into a different type of frame?()
A. Framing
B. De-encapsulation
C. Encapsulation
D. De-framing
E. None of the above
[单项选择]What information is used by a switch to forward an Ethernet frame to its destination?()
A. IP address
B. destination MAC address
C. ARP table entry
D. FCS checksum
[单项选择]What technique should be used on BGP edge routers to prevent a multi - homed autonomous system from becoming a trans it system?()
A. Advertise with a high MED value all networks that are discovered via external BGP.
B. Set the no - export community attribute on all networks that are advertised externally.
C. Remove the AS - Path information on all routes in the BGP table pr ior to advertising externally.
D. Set the origin code to incomplete for all networks that are discovered via external BGP.
E. Only advertise networks externally if they have been discovered via internal BGP.
F. Use an outgoing distribution list to filte r all networks not originating from inside the autonomous system.