单选题Which of the following could be used to prevent an attacker from accessing the master boot drive when attaching a hard drive to another system?()ABIOS passwordBDomain membershipCEFSDBitlocker

单选题
Which of the following could be used to prevent an attacker from accessing the master boot drive when attaching a hard drive to another system?()
A

BIOS password

B

Domain membership

C

EFS

D

Bitlocker


参考解析

解析: 暂无解析

相关考题:

A legacy network that is prone to errors may have issues with services that use UDP. Which of the following services could have problems in this case, due to the fact that UDP is used?() A.DNSB.TelnetC.SMTPD.SNMPE.HTTPF.TFTP

Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()A、Spanning Tree ProtocolB、Shortest path first treeC、Link-state advertisements (LSA)D、Hold-down timersE、Split horizonF、VRP

Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()A、Attacker sends multiple DHCP requests flooding DHCP serverB、Attacker connects rogue server initiating DHCP requestsC、Attacker connects rogue server replying to DHCP requestsD、Attacker sends DHCP jam signal causing DHCP server to crashE、Attacker sends gratuitous ARP replies, thereby jamming the DHCP serverF、Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server

Which of the following could be used to provide a Layer 3 data path between separate VLANs?()A、 VLAN trunkingB、 An external routerC、 An internal route processorD、 VLAN capable bridgeE、 EtherChannel

Which of the following commands could be used to start the Management Console on a workstation running Windows 2000/XP?()A、Start  Run  MCPB、Start  Run  MCEC、Start  Run  MCAD、Start  Run  MMC

A legacy network that is prone to errors may have issues with services that use UDP. Which of the following services could have problems in this case, due to the fact that UDP is used?()A、DNSB、TelnetC、SMTPD、SNMPE、HTTPF、TFTP

Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()A、RIPB、0S:FC、STPD、EGP

Which of the following could be used to restrict access to the local web server to only certain IP addresses?()A、 Create an ACL.B、 Create an application exception.C、 Configure IPSec.D、 Block port 80.

Which of the following would an attacker use to footprint a system?()A、RADIUSB、Password crackerC、Port scannerD、Man-in-the-middle attack

Which of the following storage tools could be used to initiate the rebuilding of a failed hard drive?()A、RAID array managementB、CHKDSKC、Monitoring agentsD、Partitioning management

Which of the following could be used to prevent an attacker from accessing the master boot drive when attaching a hard drive to another system?()A、BIOS passwordB、Domain membershipC、EFSD、Bitlocker

Which of the following utilities could be used to determine a subnet mask?()A、PINGB、NSLOOKUPC、TRACERTD、IPCONFIG

Which of the following resources could be used to obtain the latest IBM DS Storage ManagerUser’s Guide?()A、InfoCenter web siteB、Announcement letterC、IBM Redbook web siteD、IBMTechline/Partnerline

Which two statements regarding asymmetric key encryption are true?()A、The same key is used for encryption and decryption.B、It is commonly used to create digital certificate signatures.C、It uses two keys: one for encryption and a different key for decryption.D、An attacker can decrypt data if the attacker captures the key used for encryption

单选题Which of the following could BEST be used to recover a failed RAID 1 disk after it has been replaced?()A Tape restore utilitiesB Imaging utilitiesC Partitioning utilitiesD Array management utilities

单选题Which of the following can be concluded from the author’s statement “Any beneficial substances from the turtles could also be synthesized chemically, so as to prevent the killing of turtles” in Paragraph 3 ?AThe author feels sorry for killing turtles massively.BTurtles can be used to substitute many other medicines.CMany other kinds of herbs can be as useful as turtles.DInternational market feels happy for Chinese businessmen to buy.

单选题Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()ARIPB0S:FCSTPDEGP

单选题Which of the following storage tools could be used to initiate the rebuilding of a failed hard drive?()A RAID array managementB CHKDSKC Monitoring agentsD Partitioning management

单选题Which of the following methods is used to prevent throttling of compressed air through the diesel engine air starting valves?()AHolding the valve open for a long periodBIncreasing the starting air pressure usedCOpening the stating air valve quicklyDReducing the starting air valve size

多选题Which two statements regarding asymmetric key encryption are true?()AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption

多选题A legacy network that is prone to errors may have issues with services that use UDP. Which of the following services could have problems in this case, due to the fact that UDP is used?()ADNSBTelnetCSMTPDSNMPEHTTPFTFTP

多选题Which of the following settings could prevent two potential EIGRP neighbors from becoming neighbors?()AThe i nterface used by one router to connect to the other router is passive in the EIGRP process.BDuplicate EIGRP router IDs.CMismatched Hold Timers.DIP addresses of 10.1.1.1/24 and 10.2.2.2/24, respectively.

多选题Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()ASpanning Tree ProtocolBShortest path first treeCLink-state advertisements (LSA)DHold-down timersESplit horizonFVRP

单选题A MAC address flood attack is occurring on the LAN. During this attack, numerous frames areforwarded to a switch which causes the CAM table to fill to capacity. How does this action benefitthe attacker?()AAll traffic is tagged with a specific VLAN ID from the VLAN of the attacker and is now viewableBClients will forward packets to the attacking device, which will in turn send them to the desireddestination but not before recording the traffic patternsCAll traffic is redirected to the VLAN that the attacker used to flood the CAM tableDAll traffic is flooded out all ports and an attacker is able to capture all dataENone of the other alternatives apply

多选题Which two statements regarding symmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption.

单选题Which protocol is used by multicast to prevent loops?()AOSPFBRIPCRPFDBGPEEIGRP