A.Performing end-user training on the use of antispyware software
B.Performing virus scans
C.Scanning a network for active IP addresses and open ports on those IP addresses
D.Using password-cracking utilities
您可能感興趣的試卷
你可能感興趣的試題
A.Top-secret
B.Confidential
C.SBU
D.Secret
A.Host-based IPS can work in promiscuous mode or inline mode.
B.Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.
C.Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows.
D.Host-based IPS deployment requires less planning than network-based IPS.
A.HMAC
B.RSA
C.MD5
D.SHA-1
A.MD65
B.SHA-135
C.XR12
D.MD5
A.Ciphertext
B.Salt
C.Cryptotext
D.Rainbow table
最新試題
What is a static packet-filtering firewall used for ?()
What is the objective of Diffie-Hellman?()
Which one of the Cisco IOS commands can be used to verify that either the Cisco IOS image, theconfiguration files,or both have been properly backed up and secured?()
Which statement is true about a Smurf attack?()
For the following items, which one acts as a VPN termination device and is located at a primary networklocation?()
Which key method is used to detect and prevent attacks by use of IDS and/or IPS technologies?()
Which one of the aaa accounting commands can be used to enable logging of both the start and stoprecords for user terminal sessions on the router?()
A standard access control list has been configured on a router and applied to interface Serial 0 in anoutbound direction. No ACL is applied to Interface Serial 1 on the same router. What will happen whentraffic being filtered by the access list does not match the configured ACL statements for Serial 0?()
During role-based CLI configuration, what must be enabled before any user views can be created?()
What will be disabled as a result of the no service password-recovery command?()