多选题Which of the following are methods to automatically update the antivirus application?() (Select TWO).AEstablish rules in the email scheduling program to perform updates.BSelect Update Now from the program options.CUse the Automatic Update feature built into the application.DUse scripts.EUse Windows Update.

多选题
Which of the following are methods to automatically update the antivirus application?() (Select TWO).
A

Establish rules in the email scheduling program to perform updates.

B

Select Update Now from the program options.

C

Use the Automatic Update feature built into the application.

D

Use scripts.

E

Use Windows Update.


参考解析

解析: 暂无解析

相关考题:

Which of the following scheduling methods uses more of the risk management concepts:A ADMB PDMC CPMD PERTE Gantt

Which one of the following is not an acquisition method?A advertisingB invitationC negotiationD purchaseE all are acquisition methods

Which of the following should an administrator do after running a command from the console onthe perimeter router?() A. Update the configuration logsB. Update the network wiring schematicsC. Update the network configuration proceduresD. Compare the configuration with the baseline

Which of the following privileges permits a user to update the comment on a sequence?() A.CONTROLB.UPDATEC.USAGED.ALTER

Which of the following are methods to automatically update the antivirus application?() (Select TWO).A、Establish rules in the email scheduling program to perform updates.B、Select Update Now from the program options.C、Use the Automatic Update feature built into the application.D、Use scripts.E、Use Windows Update.

Which of the following should an administrator do after running a command from the console onthe perimeter router?()A、Update the configuration logsB、Update the network wiring schematicsC、Update the network configuration proceduresD、Compare the configuration with the baseline

Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()A、RIPB、0S:FC、STPD、EGP

Which of the following methods of user authentication is the MOST secure?()A、CHAPB、KerberosC、TACACSD、EAP

A technician is setting up a network and wants to automatically assign IP addresses. Which of the following will need to be configured to automatically assign IP addresses?()A、WINSB、DNSC、DHCPD、NTP

Which of the following methods can move files in clear text and can be easily intercepted?()A、RSHB、SNMPC、FTPD、TELNET

Which of the following replication methods provides a disaster recovery system with minimal downtime to normal operations?()A、 Cold siteB、 Warm siteC、 GFSD、 Hot site

Which of the following circumstances would automatically create a system restore point?()A、installation of an unsigned driverB、a system crashC、installation of an application that uses Windows Installer or installation of Shield Pro version 6.0 or laterD、installing an update by using the Windows Update or Automatic UpdatesE、each time the system is rebooted

Which of the following archiving methods only backs up data that has changed since the previous full backup?()A、SnapshotB、IncrementalC、CopyD、Differential

Which of the following routing protocols uses AS-Path as one of the methods to build the routing table?()A、OSPFB、IS-ISC、EIGRPD、BGP

Which of the following allows a Windows 7 remote user to edit a file offline then automatically update the changes when back in the office?()A、Windows DefenderB、Sync CenterC、Windows AeroD、HomeGroup

Computers on the network are frequently infected with viruses, malware, worms and Trojans.Which of the following should Mike, a technician, update automatically to prevent future problems?()A、Antivirus signaturesB、Antivirus enginesC、Malware enginesD、Virus encyclopedias

Which of the following commands will display any user defined verification methods?()A、cldumpB、clautover vC、clve c .custom vD、cllscustom t verify

Which best describes the main purpose of Service Update Management Assistant (SUMA)?()A、Schedules the install AIX APARs and updatesB、Automatically installs AIX APARs and updates via the HMCC、Schedules and automates the download of AIX APARS and updatesD、Automatically queries existing machines and alerts when APARS and updates are available

When configuring an interface using SMIT and Further Configuration with an IP address and netmask, which of the following outcomes indicates how the routing tables will be affected?()A、A subnet route is automatically addedB、A default route is automatically addedC、All other routes are automatically addedD、The routing table is not affected

A user utilizing an alias to update a subset of columns in a table must have UPDATE privileges on which of the following DB2 objects?()A、TableB、ColumnsC、Table and AliasD、Columns and Alias

A System p administrator needs to upgrade a system from AIX 5.2 to AIX 5.3.  Which of the following installation methods would minimize downtime()A、Migration installationB、Partition MobilityC、alt_disk_installD、update_all smit fastpath and reboot during the next scheduled outage

Which of the following privileges permits a user to update the comment on a sequence?()A、CONTROLB、UPDATEC、USAGED、ALTER

单选题Which of the following is the name of the routing update process involved when a change occursin the routing environment?()ASupernettingBDynamicCSublettingDConvergence

单选题An administrator needs to update a router configuration for a router that does not support SSH.Which of the following can be used to securely update the router configuration?()AFTPBSNMPv2CTFTPDKTTPS

单选题Which of the following passive cooling methods BEST dissipates a component’s heat?()AHeatsinkBFanCLiquid coolingDCompressed air