●The (75)is designed specifically as a security system for preventing unauthorized communications between one computer network and another computer network.
(75)A.firewall
B.protocol
C.hacker
D.virus
第1题:
TCP(Transmission Control Protocol)was specifically designed to provide a reliable end-to-end byte stream over a(n)(70).
A.IP address
B.reliable network
C.socket
D.unreliable internetwork
第2题:
第3题:
Why would a network administrator configure port security on a switch?()
第4题:
What are two uses of NAT?()
第5题:
Which cisco security product line uses deep inspection to identify and prevent malicious attacks,resource misuse, and unauthorized access?()
第6题:
Which of the following technologies is specifically designed to increase server virtualization performance?()
第7题:
Which two are uses of NAT?()
第8题:
第9题:
Ship security plan
Company security plan
Port facility security plan
National security plan
第10题:
to prevent unauthorized Telnet access to a switch port
to limit the number of Layer 2 broadcasts on a particular switch port
to prevent unauthorized hosts from accessing the LAN
to protect the IP and MAC address of the switch and associated ports
to block unauthorized access to the switch management interfaces over common TCP ports
第11题:
pulse
exhaust
fluctuating
hunting
第12题:
carry low density cargoes
protect fragile cargoes
stow cargoes with concentrated weights such as machinery
carry cargoes of very low stowage factors
第13题:
Transverse frames are more widely spaced on a ship that is designed with the ______.
A.Centerline system of framing
B.Isometric system of framing
C.Longitudinal system of framing
D.Transverse system of framing
第14题:
第15题:
Which of the following expansion card slots was designed specifically for video cards?()
第16题:
Which statements describe two of the benefits of VLAN Trunking Protocol?()
第17题:
An administrator is troubleshooting issues on an application server.After a root cause analysis,the administrator has determined that there were some unauthorized logins to the server.Which of the following locations would BEST help to determine details about the unauthorized logins?()
第18题:
Which of the following would be used to monitor unauthorized access to data files?()
第19题:
PCIe
ISA
AGP
PCIx
第20题:
Ship security plan
Company security plan
Port facility security plan
National security plan
第21题:
Multicore processing
VT
64-bit processing
Hyperthreading
第22题:
VTP allows routing between VLANs.
VTP allows a single switch port to carry information to more than one VLAN.
VTP allows physically redundant links while preventing switching loops.
VTP simplifies switch administration by allowing switches to automatically share VLAN configuration information.
VTP helps to limit configuration errors by keeping VLAN naming consistent across the VTP domain.
VTP enhances security by preventing unauthorized hosts from connecting to the VTP domain.
第23题:
centerline system of framing
isometric system of framing
longitudinal system of framing
transverse system of framing