itgle.com
更多“A firewall is a security system designed to(62) an organization's network against(63).A.pr ”相关问题
  • 第1题:

    ●A firewall is a (68) system designed to (69) all organization,s network aga-inst threats.

    (68) A.operating

    B.programming

    C.security

    D.service

    (69) A.prevent

    B.protect

    C.develop

    D.exploit


    正确答案:C,B
    【解析】防火墙是一个安全系统,主要用于保护公司内部网络免遭攻击。

  • 第2题:

    Basically, a firewall is a(145)process or a set of integrated processes that runs on a router or(146)to control the flow of networked application traffic(147)through it. Typically, firewalls are placed on the entry point to a(148)network such as the Internet. They could be considered traffic cops. The firewall's(149)is to ensure that all communication between an organization's network and the Internet conform. to the organization's policies.

    A.dependent

    B.isolated

    C.related

    D.standalone


    正确答案:D

  • 第3题:

    Basically, a(71)is a standalone process or a set of integrated processes that runs on a router or server to control the flow of(72)application traffic(73)through it. Typically, firewalls are(74)on the entry point to a public network such as the Internet. They could be considered traffic cops. The firewall' s(75)is to ensure that all communication between an organization's network and the Internet conform. to the organization's security policies.

    A.router

    B.client

    C.firewall

    D.switch


    正确答案:A

  • 第4题:

    A Stateful firewall is MOST useful in protecting against which of the following network scans?()

    A.PING

    B.UDP

    C.Xmas

    D.ACK


    参考答案:C

  • 第5题:

    A firewall is a(72)system designed to(73)an organization's network aga-inst threats.

    A.operating

    B.programming

    C.security

    D.service


    正确答案:C

  • 第6题:

    work(请作答此空),systems that effectively isolate an organization's internal network structure from an ( ) network, such as the INTERNET is becoming increasingly popular. These firewall systems typically act as application-layer( )between networks, usually offering controlled TELNET, FTP, and SMTP access. With the emergence of more sophisticated( )layer protocols designed to facilitate global information discovery , there exists a need to provide a general ( )for these protocols to transparently and securely traverse a firewall.

    A.safeguards
    B.firewalls
    C.routers
    D.switches

    答案:B
    解析:
    掌握基本词汇,本题还是比较容易的。参考翻译如下:

  • 第7题:

    A network vulnerability scanner is part of which critical element of network and system security?()

    • A、host security
    • B、perimeter security
    • C、security monitoring
    • D、policy management

    正确答案:C

  • 第8题:

    A Stateful firewall is MOST useful in protecting against which of the following network scans?()

    • A、PING
    • B、UDP
    • C、Xmas
    • D、ACK

    正确答案:C

  • 第9题:

    Which statement accurately describes firewall user authentication?()

    • A、Firewall user authentication provides another layer of security in a network.
    • B、Firewall user authentication provides a means for accessing a JUNOS Software-based security device.
    • C、Firewall user authentication enables session-based forwarding.
    • D、Firewall user authentication is used as a last resort security method in a network.

    正确答案:A

  • 第10题:

    Your network contains a computer named Computer1 that runs Windows 7.You need to verify if Computer1 has active DirectAccess connections to the network.What should you do?()

    • A、From Network Connections, right-click the active network connection, and then click Status.
    • B、From Network Connections, select the active network connection, and then click Diagnose this connection.
    • C、From Windows Firewall with Advanced Security, click Monitoring, and then click Connection Security Rules.
    • D、From Windows Firewall with Advanced Security, click Monitoring, click Security Associations, and then click Main Mode.

    正确答案:D

  • 第11题:

    多选题
    Which two statements are true regarding firewall user authentication?()
    A

    When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.

    B

    When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.

    C

    If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.

    D

    If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.


    正确答案: B,C
    解析: 暂无解析

  • 第12题:

    单选题
    The Cisco network-based virtual firewall service solution helps service providers to deliver costeffective, scalable, integrated security services for enterprise customers using Cisco platforms .What is a virtual firewall?()
    A

    another name for a firewall deployed in routed mode

    B

    another name for a firewall deployed in transparent mode

    C

    a separation of multiple firewall security contexts on a single firewall

    D

    a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context


    正确答案: D
    解析: 暂无解析

  • 第13题:

    A firewall is a(68)system designed to(69)all organization, s network against threats.

    A.operating

    B.programming

    C.security

    D.service


    正确答案:C

  • 第14题:

    The firewall device is a( )system for connecting a computer network to other computer network.

    A.hardware

    B.software

    C.security

    D.I/O


    正确答案:C
    解析:防火墙设备是将一个计算机网络连接到另一个计算机网络的安全系统。

  • 第15题:

    A firewall is a(71)system designed to(72)an organization's network against threats.

    A.operating

    B.programming

    C.security

    D.data


    正确答案:C
    解析:译文:防火墙是一个安全系统,它被设计用来保护某组织的网络不受破坏。

  • 第16题:

    A firewall is a (1) ystem designed to (2) n organization's network against threats.

    A.operating

    B.programming

    C.security

    D.service


    正确答案:C

  • 第17题:

    ●The (75)is designed specifically as a security system for preventing unauthorized communications between one computer network and another computer network.

    (75)A.firewall

    B.protocol

    C.hacker

    D.virus


    正确答案:A

  • 第18题:

    Which two statements are true regarding firewall user authentication?() (Choose two.)

    • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
    • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
    • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
    • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

    正确答案:B,C

  • 第19题:

    Which two are needed components when designing and implementing a security solution?()

    • A、detailed VLAN information
    • B、an incident response plan
    • C、results of testing the new network configuration
    • D、an existing hierarchical network topology
    • E、a security policy for your organization

    正确答案:B,E

  • 第20题:

    Which two statements are true regarding firewall user authentication?()

    • A、When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
    • B、When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
    • C、If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.
    • D、If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

    正确答案:B,C

  • 第21题:

    You need to configure a computer to encrypt all inbound connections by using IPSec. What should you do?()

    • A、From Network and Sharing Center, click Connect to a network.
    • B、From Network and Sharing Center, click Set up a new connection or network.
    • C、From Windows Firewall with Advanced Security, click Inbound Rules and then click New Rule.
    • D、From Windows Firewall with Advanced Security, click Connection Security Rules and then click NewRule.

    正确答案:D

  • 第22题:

    单选题
    A network vulnerability scanner is part of which critical element of network and system security?()
    A

     host security

    B

     perimeter security

    C

     security monitoring

    D

     policy management


    正确答案: B
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements are true regarding firewall user authentication?() (Choose two.)
    A

    When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.

    B

    When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.

    C

    If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .

    D

    If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.


    正确答案: D,A
    解析: 暂无解析