单选题Which of the following could be used to prevent an attacker from accessing the master boot drive when attaching a hard drive to another system?()ABIOS passwordBDomain membershipCEFSDBitlocker
单选题
Which of the following could be used to prevent an attacker from accessing the master boot drive when attaching a hard drive to another system?()
A
BIOS password
B
Domain membership
C
EFS
D
Bitlocker
参考解析
解析:
暂无解析
相关考题:
A legacy network that is prone to errors may have issues with services that use UDP. Which of the following services could have problems in this case, due to the fact that UDP is used?() A.DNSB.TelnetC.SMTPD.SNMPE.HTTPF.TFTP
Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()A、Spanning Tree ProtocolB、Shortest path first treeC、Link-state advertisements (LSA)D、Hold-down timersE、Split horizonF、VRP
Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()A、Attacker sends multiple DHCP requests flooding DHCP serverB、Attacker connects rogue server initiating DHCP requestsC、Attacker connects rogue server replying to DHCP requestsD、Attacker sends DHCP jam signal causing DHCP server to crashE、Attacker sends gratuitous ARP replies, thereby jamming the DHCP serverF、Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server
Which of the following could be used to provide a Layer 3 data path between separate VLANs?()A、 VLAN trunkingB、 An external routerC、 An internal route processorD、 VLAN capable bridgeE、 EtherChannel
Which of the following commands could be used to start the Management Console on a workstation running Windows 2000/XP?()A、Start Run MCPB、Start Run MCEC、Start Run MCAD、Start Run MMC
A legacy network that is prone to errors may have issues with services that use UDP. Which of the following services could have problems in this case, due to the fact that UDP is used?()A、DNSB、TelnetC、SMTPD、SNMPE、HTTPF、TFTP
Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()A、RIPB、0S:FC、STPD、EGP
Which of the following could be used to restrict access to the local web server to only certain IP addresses?()A、 Create an ACL.B、 Create an application exception.C、 Configure IPSec.D、 Block port 80.
Which of the following would an attacker use to footprint a system?()A、RADIUSB、Password crackerC、Port scannerD、Man-in-the-middle attack
Which of the following storage tools could be used to initiate the rebuilding of a failed hard drive?()A、RAID array managementB、CHKDSKC、Monitoring agentsD、Partitioning management
Which of the following could be used to prevent an attacker from accessing the master boot drive when attaching a hard drive to another system?()A、BIOS passwordB、Domain membershipC、EFSD、Bitlocker
Which of the following utilities could be used to determine a subnet mask?()A、PINGB、NSLOOKUPC、TRACERTD、IPCONFIG
Which of the following resources could be used to obtain the latest IBM DS Storage ManagerUser’s Guide?()A、InfoCenter web siteB、Announcement letterC、IBM Redbook web siteD、IBMTechline/Partnerline
Which two statements regarding asymmetric key encryption are true?()A、The same key is used for encryption and decryption.B、It is commonly used to create digital certificate signatures.C、It uses two keys: one for encryption and a different key for decryption.D、An attacker can decrypt data if the attacker captures the key used for encryption
单选题Which of the following could BEST be used to recover a failed RAID 1 disk after it has been replaced?()A Tape restore utilitiesB Imaging utilitiesC Partitioning utilitiesD Array management utilities
单选题Which of the following can be concluded from the author’s statement “Any beneficial substances from the turtles could also be synthesized chemically, so as to prevent the killing of turtles” in Paragraph 3 ?AThe author feels sorry for killing turtles massively.BTurtles can be used to substitute many other medicines.CMany other kinds of herbs can be as useful as turtles.DInternational market feels happy for Chinese businessmen to buy.
单选题Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()ARIPB0S:FCSTPDEGP
单选题Which of the following storage tools could be used to initiate the rebuilding of a failed hard drive?()A RAID array managementB CHKDSKC Monitoring agentsD Partitioning management
单选题Which of the following methods is used to prevent throttling of compressed air through the diesel engine air starting valves?()AHolding the valve open for a long periodBIncreasing the starting air pressure usedCOpening the stating air valve quicklyDReducing the starting air valve size
多选题Which two statements regarding asymmetric key encryption are true?()AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption
多选题A legacy network that is prone to errors may have issues with services that use UDP. Which of the following services could have problems in this case, due to the fact that UDP is used?()ADNSBTelnetCSMTPDSNMPEHTTPFTFTP
多选题Which of the following settings could prevent two potential EIGRP neighbors from becoming neighbors?()AThe i nterface used by one router to connect to the other router is passive in the EIGRP process.BDuplicate EIGRP router IDs.CMismatched Hold Timers.DIP addresses of 10.1.1.1/24 and 10.2.2.2/24, respectively.
多选题Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()ASpanning Tree ProtocolBShortest path first treeCLink-state advertisements (LSA)DHold-down timersESplit horizonFVRP
单选题A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()AAll traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewableBClients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patternsCAll traffic is redirected to the VLAN that the attacker used to flood the CAM tableDAll traffic is flooded out all ports and an attacker is able to capture all dataENone of the other alternatives apply
多选题Which two statements regarding symmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption.
单选题Which protocol is used by multicast to prevent loops?()AOSPFBRIPCRPFDBGPEEIGRP