单选题Client exclusion policies are used to mitigate which of the following attacks?()AdictionaryBbit-flip and replayCmac spoofingDman-in-the-middle
单选题
Client exclusion policies are used to mitigate which of the following attacks?()
A
dictionary
B
bit-flip and replay
C
mac spoofing
D
man-in-the-middle
参考解析
解析:
暂无解析
相关考题:
A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat() A. Incident responseB. Asset managementC. Patch managementD. Policies and procedures
If all client exclusion policies are enabled, on which number of tries will 802.1X authentications be excludedusing controller-based access points?()A、threeB、fourC、fiveD、six
Client exclusion policies are used to mitigate which of the following attacks?()A、dictionaryB、bit-flip and replayC、mac spoofingD、man-in-the-middle
Which of the following statements that describe Diffie Hellman Key exchange are correct? ()A、 A DH key exchange is an algorithm that utilizes asymmetric cryptographic keys.B、 The DH key exchange is used to establish a shared secret over an insecure medium during an IPSec phase 1 exchange.C、 The DH exchange is susceptible to man-in-the-middle attacks.D、 The DH exchange is used to authenticate the peer device duringan IPSec phase 1 exchange.E、A DH exchange provides Perfect Forward Secrecy (PFS).
Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()A、Update antivirus definitionsB、MAC filteringC、Effective security policiesD、User awareness training
You are responsible for increasing the security within the Company LAN. Of the following choices listed below, which is true regarding layer 2 security and mitigation techniques? ()A、 Enable root guard to mitigate ARP address spoofing attacks.B、 Configure DHCP spoofing to mitigate ARP address spoofing attacks.C、 Configure PVLANs to mitigate MAC address flooding attacks.D、 Enable root guard to mitigate DHCP spoofing attacks.E、 Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted ports.F、 Configure port security to mitigate MAC address flooding G、 None of the other alternatives apply
Which two statements about common network attacks are true?()A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.B、Access attacks can consist of password attacks,ping sweeps,port scans,and man-in-the-middle attacks.C、Access attacks can consist of packet sniffers,ping sweeps,port scans,and man-in-the-middle attacks.D、Reconnaissance attacks can consist of password attacks,trust exploitation,port redirection and Internet information queries.E、Reconnaissance attacks can consist of packet sniffers,port scans,ping sweeps,and Internet information queries.F、Reconnaissance attacks can consist of ping sweeps,port scans,man-in-middle attacks and Internet information queries.
If all client exclusion policies are enabled,on which number of tries will 802.1x authentications be excluded using controller-based access points?()A、fiveB、threeC、sixD、four
Birthday attacks are used against which of the following?()A、 digital signaturesB、 symmetric cipheringC、 hashalgoritmsD、 asymmetric cipheringE、 digital certificates
Observe the following options carefully, which two attacks focus on RSA? ()A、BPA attackB、Adaptive chosen ciphertext attackC、DDoS attackD、Man-in-the-middle attack
Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A、The cell phone should require a password after a set period of inactivity.B、The cell phone should only be used for company related emails.C、The cell phone data should be encrypted according to NIST standards.D、The cell phone should have data connection abilities disabled.
Which of the following is used to deny or allow access to a wireless router network?()A、SSIDB、SNMPC、IMAPD、MAC filtering
A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat()A、Incident responseB、Asset managementC、Patch managementD、Policies and procedures
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS
单选题Birthday attacks are used against which of the following?()A digital signaturesB symmetric cipheringC hashalgoritmsD asymmetric cipheringE digital certificates
多选题Which of the following statements that describe Diffie Hellman Key exchange are correct? ()AA DH key exchange is an algorithm that utilizes asymmetric cryptographic keys.BThe DH key exchange is used to establish a shared secret over an insecure medium during an IPSec phase 1 exchange.CThe DH exchange is susceptible to man-in-the-middle attacks.DThe DH exchange is used to authenticate the peer device duringan IPSec phase 1 exchange.EA DH exchange provides Perfect Forward Secrecy (PFS).
多选题On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()ASource Quench.BLearning.CBuffering.DWindowing.ECut-Through.
单选题Which of the following computers are used for basic applications and meets the MINIMUMrequirements for running Windows?()AVirtualization workstationBHome server PCCCAD workstationDThin client
单选题Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()AHoneynetBHoneypotCVulnerability scannerDNetwork based IDS
单选题Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()AThe cell phone should require a password after a set period of inactivity.BThe cell phone should only be used for company related emails.CThe cell phone data should be encrypted according to NIST standards.DThe cell phone should have data connection abilities disabled.
单选题If all client exclusion policies are enabled, on which number of tries will 802.1X authentications be excludedusing controller-based access points?()AthreeBfourCfiveDsix
单选题On the wlse, which of the following fault policies would be used to verify that access to the command-line interface of the access point is secure?()Aregistration errorBauthentication failures thresholdChttp disabledDtelnet disabled
单选题Which of the following devices is used to move frames between a source and destination basedon a MAC address?()ARepeaterBHubCRouterDSwitch
单选题Which of the following is used by RADIUS to encrypt messages between the server and the client?()APublic keyBCSU/DSUCPrivate keyDShared secret
单选题You are responsible for increasing the security within the Company LAN. Of the following choices listed below, which is true regarding layer 2 security and mitigation techniques? ()A Enable root guard to mitigate ARP address spoofing attacks.B Configure DHCP spoofing to mitigate ARP address spoofing attacks.C Configure PVLANs to mitigate MAC address flooding attacks.D Enable root guard to mitigate DHCP spoofing attacks.E Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted ports.F Configure port security to mitigate MAC address flooding G None of the other alternatives apply
单选题If all client exclusion policies are enabled,on which number of tries will 802.1x authentications be excluded using controller-based access points?()AfiveBthreeCsixDfour
单选题A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()AUser ID/password fileBCommunications layerCClient applicationsDOperating system