单选题Which of the following types of software protection will help mitigate any threats coming fromworms or Trojans?()ASpam blockerBAnti-VirusCAnti SpywareDAnti adware

单选题
Which of the following types of software protection will help mitigate any threats coming fromworms or Trojans?()
A

Spam blocker

B

Anti-Virus

C

Anti Spyware

D

Anti adware


参考解析

解析: 暂无解析

相关考题:

A user is reporting that they are getting pop-ups while they are not actively browsing the Internet.Which of the following would BEST resolve this issue?() A.AntivirusB.FirewallC.Anti-spywareD.Pop-upblocker

Which of the following will MOST likely cause major performance issues on an email server?() A. RAID 0 configurationB. PBX softwareC. DHCP serverD. Anti-virus software

An administrator needs to update the anti-virus, security patches, BIOS, and the web server software on a production system. Which of the following is the BEST method to accomplish this?() A. Update anti-virus, security patches, BIOS software, and then the web software.B. Update the web software, security patches, anti-virus, and then the BIOS.C. Update security patches, BIOS, web software, and then the anti-virus.D. The order does not matter, only one change at a time should be done.

Which of the following security threats are MOST likely prevented through user training?() A. Network IntrusionB. Adware PopupsC. Social EngineeringD. Spam Messages

Which of the following types of software protection will help mitigate any threats coming fromworms or Trojans?() A. Spam blockerB. Anti-VirusC. Anti SpywareD. Anti adware

Which of the following is the MOST effective method to restrict staff members from accessing a service on a company server?() A. Implement ACLs.B. Disable accounts for staff members who do not require server access.C. Implement anti-spam software on the server.D. Implement anti-virus software on the server.

Malware has been detected and removed on a customer computer several times in a short periodof time. Which of the following will BEST help prevent future occurrences?()A、Defragment the hard driveB、Discuss safe web-browsing habits with the customerC、Delete temporary files, cookies and browser historyD、Install anti-virus software which uses manual updates

Which of the following web browser features deters users from visiting spoofed sites?()A、Anti-malware detectionB、Anti-phishing filtersC、Anti-spyware filtersD、Antivirus engines

Which of the following is unsafe for a technician to use when troubleshooting or repairing a CRT monitor?()A、Anti-static padB、Anti-static wrist strapC、Rubber glovesD、Multimeter

An administrator needs to update the anti-virus, security patches, BIOS, and the web server software on a production system. Which of the following is the BEST method to accomplish this?()A、Update anti-virus, security patches, BIOS software, and then the web software.B、Update the web software, security patches, anti-virus, and then the BIOS.C、Update security patches, BIOS, web software, and then the anti-virus.D、The order does not matter, only one change at a time should be done.

Which of the following will MOST likely cause major performance issues on an email server?()A、RAID 0 configurationB、PBX softwareC、DHCP serverD、Anti-virus software

Which of the following is the MOST effective method to restrict staff members from accessing a service on a company server?()A、Implement ACLs.B、Disable accounts for staff members who do not require server access.C、Implement anti-spam software on the server.D、Implement anti-virus software on the server.

A user is reporting that they are getting pop-ups while they are not actively browsing the Internet.Which of the following would BEST resolve this issue?()A、AntivirusB、FirewallC、Anti-spywareD、Pop-upblocker

Which of the following security threats are MOST likely prevented through user training?()A、Network IntrusionB、Adware PopupsC、Social EngineeringD、Spam Messages

Which of the following types of software protection will help mitigate any threats coming fromworms or Trojans?()A、Spam blockerB、Anti-VirusC、Anti SpywareD、Anti adware

How do you apply UTM enforcement to security policies on the branch SRX series?()A、UTM profiles are applied on a security policy by policy basis.B、UTM profiles are applied at the global policy level.C、Individual UTM features like anti-spam or anti-virus are applied directly on a security policy by policy basis.D、Individual UTM features like anti-spam or anti-virus are applied directly at the global policy level.

You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails.Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?()A、set security policies from-zone dmz to-zone untrust policy anti-spam then permit application- services utm-policy Block-SpamB、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services utm-policy Block-SpamC、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services anti-spam-policyD、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services Block-Spam

单选题You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails.Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?()Aset security policies from-zone dmz to-zone untrust policy anti-spam then permit application- services utm-policy Block-SpamBset security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services utm-policy Block-SpamCset security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services anti-spam-policyDset security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services Block-Spam

单选题Which of the following is the MOST effective method to restrict staff members from accessing a service on a company server?()A Implement ACLs.B Disable accounts for staff members who do not require server access.C Implement anti-spam software on the server.D Implement anti-virus software on the server.

单选题An administrator needs to update the anti-virus, security patches, BIOS, and the web server software on a production system.  Which of the following is the BEST method to accomplish this?()A Update anti-virus, security patches, BIOS software, and then the web software.B Update the web software, security patches, anti-virus, and then the BIOS.C Update security patches, BIOS, web software, and then the anti-virus.D The order does not matter, only one change at a time should be done.

单选题Malware has been detected and removed on a customer computer several times in a short periodof time. Which of the following will BEST help prevent future occurrences?()ADefragment the hard driveBDiscuss safe web-browsing habits with the customerCDelete temporary files, cookies and browser historyDInstall anti-virus software which uses manual updates

单选题Which of the following is the MOST effective method to restrict staff members from accessing a service on a company server?()AImplement ACLs.BDisable accounts for staff members who do not require server access.CImplement anti-spam software on the server.DImplement anti-virus software on the server.

单选题A user has discovered that even though they are using the latest version of the anti-virus software,the computer is still being infected by a virus. Which of the following is the BEST solution for this problem?()AReplace the computer.BRun chkdsk /f.CUpdate the virus signatures.DRun scandisk.

单选题Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()AIntrusion detectionBVirtualizationCKitingDCloning

单选题How do you apply UTM enforcement to security policies on the branch SRX series?()AUTM profiles are applied on a security policy by policy basis.BUTM profiles are applied at the global policy level.CIndividual UTM features like anti-spam or anti-virus are applied directly on a security policy by policy basis.DIndividual UTM features like anti-spam or anti-virus are applied directly at the global policy level.

单选题Which of the following is an example of a security technology that could be enabled by Netflow?()A Anomaly DetectionB SYN CookiesC Application InspectionD Content filteringE Anti-X ProtectionF Anti Virus

单选题Which of the following will MOST likely cause major performance issues on an email server?()A RAID 0 configurationB PBX softwareC DHCP serverD Anti-virus software