问题:单选题An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()A NIPSB HoneypotC DMZD NIDS...
查看答案
问题:单选题Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()A Protocol analyzerB Vulnerability scannerC Port scannerD Penetration test...
问题:单选题Which of the following requires an update to the baseline after installing new software on a machine?()A Signature-based NIPSB Signature-based NIDSC HoneypotD Behavior-based HIDS...
问题:单选题Which of the following would an attacker use to footprint a system?()A RADIUSB Password crackerC Port scannerD Man-in-the-middle attack...
问题:单选题Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()A Intrusion detectionB VirtualizationC KitingD Cloning...
问题:单选题Which of the following describes a static NAT?()A A static NAT uses a one to many mapping.B A static NAT uses a many to one mapping.C A static NAT uses a many to many mapping.D A static NAT uses a one to one mapping....
问题:单选题Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A The cell phone should require a password after a set period of inactivity.B The cel...
问题:单选题If a user attempts to go to a website and notices the URL has changed, which of the following attacks is MOST likely the cause?()A DLL injectionB DDoS attackC DNS poisoningD ARP poisoning...
问题:单选题Which of the following encryption methods is often used along with L2TP?()A S/MIMEB SSHC 3DESD IPSec...
问题:单选题Which of the following specifies a set of consistent requirements for a workstation or server?()A Vulnerability assessmentB Imaging softwareC Patch managementD Configuration baseline...