Protocol analyzer
Vulnerability scanner
Port scanner
Penetration test
第1题:
Examine the following options,which Spanning Tree Protocol (STP) protection mechanism disables aswitch port if the port receives a Bridge Protocol Data Unit (BPDU)?()
第2题:
Which of the following monitors a server to see which protocols might be in use?()
第3题:
Which of the following is the BEST way to allow web software through the server firewall?()
第4题:
An administrator is planning an upgrade of a major software package on an application server.The software has been tested successfully in a test environment and it is ready to go into production. Which of the following steps should the administrator take next?()
第5题:
Which of the following is the LEAST intrusive?()
第6题:
Your database is not configured for session failover. Your tnsnames.ora file contains the following details: test.us.oracle.com= (DESCRIPTION= (ADDRESS_LIST= (LOAD_BALANCE=off) (FAILOVER=ON) (ADDRESS= (PROTOCOL=tcp)(HOST=test1-server)(PORT=1521)) (ADDRESS= (PROTOCOL=tcp)(HOST=test2-server)(PORT=1521))) (CONNECT_DATA= (SERVICE_NAME=test.us.oracle.com))) Which feature is enabled in this case?()
第7题:
Line tester
Multimeter
Null modem cable
Loopback plugs
第8题:
Load balancing
Instance failover
Database failover
Connect-time failover
Transparent Application Failover (TAF)
第9题:
Identify necessary operating system updates
Implement the change
Document the change
Schedule system down time
第10题:
Identify necessary operating system updates
Implement the change
Document the change
Schedule system down time
第11题:
Create a test environment for the new version.
Determine system requirements for the upgrade.
Request bids from other competing vendors in the product space.
Document the upgrade.
第12题:
Exception
Pass-through
Port-forwarding
Punch-through
第13题:
Which of the following allows a program or port through a software firewall?()
第14题:
Which of the following is the EASIEST way to centrally deploy software?()
第15题:
Which of the following would an attacker use to footprint a system?()
第16题:
Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()
第17题:
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
第18题:
Implement an application exception.
Implement an access control list (ACL).
Open the corporate firewall to allow port 80.
Implement port blocking on port 80.
第19题:
Protocol analyzer
Vulnerability scanner
Port scanner
Penetration test
第20题:
root port
backup port
designated port
alternate port
第21题:
Network share
PXE
USB
Optical media
第22题:
Firmware update
Remote management card
Diagnostic LEDs
Multimeter
第23题:
Network share
PXE
USB
Optical media
第24题:
Uplink Fast
Port Fast
BPDU Guard
Root Guard