单选题Which of the following security features are enabled by default after creating an instance?()APassword InvalidationBLogin TimeoutCCross Site Scripting ProtectionDAccess Logging

单选题
Which of the following security features are enabled by default after creating an instance?()
A

Password Invalidation

B

Login Timeout

C

Cross Site Scripting Protection

D

Access Logging


参考解析

解析: 暂无解析

相关考题:

Which statement describes the UTM licensing model?() A. Install the license key and all UTM features will be enabled for the life of the productB. Install one license key per feature and the license key will be enabled for the life of the product.C. Install one UTM license key, which will activate all UTM features; the license will need to be renewed when it expires.D. Install one UTM license key per UTM feature; the licenses will need to be renewed when they expire.

Which of the following is BEST for providing network security?() A.FirewallB.DMZC.SwitchD.IDS

A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?() A. WEPB. Port filteringC. WPAD. Longer SSID broadcast intervals

The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()A、 security contextsB、- transparent firewallC、 WebVPND、 Active/Active failoverE、 low latency queuingF、 AIP-SSM intrusion prevention

Which of the following is an example of a security technology that could be enabled by Netflow?()A、 Anomaly DetectionB、 SYN CookiesC、 Application InspectionD、 Content filteringE、 Anti-X ProtectionF、 Anti Virus

Which of the following components provides for the BEST hardware cooling features?()A、 Epoxy pasteB、 Chip fanC、 Heat sinkD、 Virtualization

A customer wants to check whether they have the necessary tools enabled to prevent intrusions andvirus attacks on a Windows Vista workstation. Which of the following tools can be used to display thecurrent configuration? ()A、Security CenterB、Event Viewer Security logC、Windows DefenderD、Windows Firewall

On the wlse, radio management must be enabled to use most of the features of which one of the following?()A、devicesB、idsC、configureD、reports

Which of the following features on a wireless router maps the private IP address to a public IPaddress?()A、SSIDB、NATC、MAC filteringD、DHCP

Which of the following is BEST for providing network security?()A、FirewallB、DMZC、SwitchD、IDS

A laptop typically has a physical switch to disable which of the following features?()A、BluetoothB、Hard Drive Impact ProtectionC、Data EncryptionD、Wireless

Which of the following features is essential in a firewall if it is to support RTP sessions?()A、Remote consoleB、StatefulnessC、Address translationD、Zones

Which of the following does not affect security on a wireless access point?()A、EncryptionB、DHCPC、PasswordD、SSID

A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()A、WEPB、Port filteringC、WPAD、Longer SSID broadcast intervals

Which of the following are examples of physical security measures?()A、Policies and proceduresB、EncryptionC、Locked doorsD、Security personnelE、Backup tapes

Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS

Which of the following options should be used to obtain the latest security patches for AIX?()A、FixDistB、The Bonus Pack CDC、OPSD、The Security Maintenance CD

Which statement describes the UTM licensing model?()A、Install the license key and all UTM features will be enabled for the life of the productB、Install one license key per feature and the license key will be enabled for the life of the product.C、Install one UTM license key, which will activate all UTM features; the license will need to be renewed when it expires.D、Install one UTM license key per UTM feature; the licenses will need to be renewed when they expire.

Which of the following Oracle features is enabled by setting a nonzero value for the MEMORY_TARGET initialization parameter?()  A、 Automatic PGA Memory ManagementB、 Automatic SGA Memory ManagementC、 Automatic Shared Memory ManagementD、 Automatic Memory ManagementE、 Manual SGA Memory ManagementF、 None of the above

单选题Examine the following items, which one offers a variety of security solutions, including firewall, IPS, VPN,antispyware, antivirus, and antiphishing features?()ACisco IOS routerBCisco PIX 500 series security applianceCCisco 4200 series IPS applianceDCisco ASA 5500 series security appliance

多选题Which two statements are true regarding proxy ARP?()AProxy ARP is enabled by default.BProxy ARP is not enabled by default.CJUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.DJUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled

多选题The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()Asecurity contextsB- transparent firewallCWebVPNDActive/Active failoverElow latency queuingFAIP-SSM intrusion prevention

多选题Which two statements are true regarding IDP?()AIDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.BIDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.CIDP inspects traffic up to the Presentation layer.DIDP inspects traffic up to the Application layer.

单选题Which statement is true regarding proxy ARP?()AProxy ARP is enabled by default on stand-alone JUNOS security devices.BProxy ARP is enabled by default on chassis clusters.CJUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.DJUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled

单选题A customer wants to check whether they have the necessary tools enabled to prevent intrusions andvirus attacks on a Windows Vista workstation. Which of the following tools can be used to display thecurrent configuration? ()ASecurity CenterBEvent Viewer Security logCWindows DefenderDWindows Firewall

单选题Which of the following is an example of a security technology that could be enabled by Netflow?()A Anomaly DetectionB SYN CookiesC Application InspectionD Content filteringE Anti-X ProtectionF Anti Virus

单选题Which of the following Oracle features is enabled by setting a nonzero value for the MEMORY_TARGET initialization parameter?()A Automatic PGA Memory ManagementB Automatic SGA Memory ManagementC Automatic Shared Memory ManagementD Automatic Memory ManagementE Manual SGA Memory ManagementF None of the above