单选题Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?()ADisable TELNETBDisable IGMP snoopingCEnable TELNET but not SSLDDisable ICMP/ping on device

单选题
Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?()
A

Disable TELNET

B

Disable IGMP snooping

C

Enable TELNET but not SSL

D

Disable ICMP/ping on device


参考解析

解析: 暂无解析

相关考题:

In which of the following cost estimating techniques are statistics models used:A . nonparametric cost estimatingB . parametric cost estimatingC . life cycle cost estimatingD . bottom-up estimatingE . All of the above.

Risk mitigation includes all but which of the following:A Developing system (policies, procedures, responsibilities)B Obtaining insurance against lossC performing contingent planningD developing planning alternativesE identification of project risks.

Risk mitigation involves all but which of the following:A developing system standards (policies, procedure, responsibility standards)B obtaining insurance against lossC identification of project risksD performing contingent planningE developing planning alternatives

113 Risk mitigation involves all but which of the following:A. developing system standards (policies, procedure, responsibility standards)B. obtaining insurance against lossC. identification of project risksD. performing contingent planningE. developing planning alternatives

166 Risk mitigation includes all but which of the following:A. Developing system (policies, procedures, responsibilities)B. Obtaining insurance against lossC. performing contingent planningD. developing planning alternativesE. identification of project risks

A user reports that their thermal wristband printer is printing barcodes that will not scan properly.Which of the following maintenance techniques would MOST likely resolve this issue?() A. Replace the print rollerB. Reset to factory defaultsC. Replace the wristband rollD. Clean the heating assembly

Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?() A. Disable TELNETB. Disable IGMP snoopingC. Enable TELNET but not SSLD. Disable ICMP/ping on device

Which of the following security mitigation techniques is the MOST effective against zero-day attacks?() A.Update antivirus definitionsB.MAC filteringC.Effective security policiesD.User awareness training

Which of the following techniques is NOT used in the Grammar-Translation Method?A.ReadingB.TranslationC.Written workD.Oral presentation

Which of the following would be considered a routing protocol?()A、OSPFB、DHCPC、SMTPD、SNMPE、RIP

Which of the following techniques is used for tracking the project risks?()A、Probability-Impact matrixB、Pareto chartC、R-ChartD、PERT (Program Evaluation and Review Technique) analysis

A dry cleaner is having issues with their computer overheating. Which of the following preventive maintenance techniques would be the BEST short-term resolution to the problem?()A、Update the firmware on the machine to accommodate for higher temperatures.B、Use Disk Cleanup and Defrag to keep the machine from working as hard.C、Use a can of compressed air to clean out blocked ventilation.D、Relocate the machine to a cooler part of the building.

Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?()A、Disable TELNETB、Disable IGMP snoopingC、Enable TELNET but not SSLD、Disable ICMP/ping on device

Which of the following would BEST optimize a computer that is heavily used? ()A、ScandiskB、DefragC、IndexingD、Chkdsk

Which of the following storage protocols would be suitable for transport across an IP network?()A、 SASB、 SCSIC、 iSCSID、 SATA

An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?()A、Caching enginesB、QoSC、Traffic shapingD、Load balancing

Which of the following wireless security techniques is the MOST secure?()A、Enable Wired Equivalent PrivacyB、Disable SSID broadcastC、Enable Wi-Fi Protected AccessD、Enable MAC filtering

A user reports that their thermal wristband printer is printing barcodes that will not scan properly.Which of the following maintenance techniques would MOST likely resolve this issue?()A、Replace the print rollerB、Reset to factory defaultsC、Replace the wristband rollD、Clean the heating assembly

An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.  Which of the following techniques can be used to manage this?()A、 PATB、 ACLsC、 Subnet maskingD、 Port blocking

Which of the following devices would MOST likely integrate a DHCP server?()A、RouterB、HubC、SwitchD、Bridge

Following a system boot,the display indicates that previously detected hardware is missing.  Which of the following commands would identify the missing hardware?()A、diagB、lscfgC、cfgmgrD、lsslot

单选题Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()AUpdate antivirus definitionsBMAC filteringCEffective security policiesDUser awareness training

多选题Which of the following would be considered a routing protocol?()AOSPFBDHCPCSMTPDSNMPERIP

单选题Which of the following terms would best describe the temperature at which a liquid boils at a given pressure?()ADegree of saturationBSaturation temperatureCSuperheated temperatureDDegree of superheat