单选题Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?()ADisable TELNETBDisable IGMP snoopingCEnable TELNET but not SSLDDisable ICMP/ping on device
单选题
Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?()
A
Disable TELNET
B
Disable IGMP snooping
C
Enable TELNET but not SSL
D
Disable ICMP/ping on device
参考解析
解析:
暂无解析
相关考题:
In which of the following cost estimating techniques are statistics models used:A . nonparametric cost estimatingB . parametric cost estimatingC . life cycle cost estimatingD . bottom-up estimatingE . All of the above.
Risk mitigation includes all but which of the following:A Developing system (policies, procedures, responsibilities)B Obtaining insurance against lossC performing contingent planningD developing planning alternativesE identification of project risks.
Risk mitigation involves all but which of the following:A developing system standards (policies, procedure, responsibility standards)B obtaining insurance against lossC identification of project risksD performing contingent planningE developing planning alternatives
113 Risk mitigation involves all but which of the following:A. developing system standards (policies, procedure, responsibility standards)B. obtaining insurance against lossC. identification of project risksD. performing contingent planningE. developing planning alternatives
166 Risk mitigation includes all but which of the following:A. Developing system (policies, procedures, responsibilities)B. Obtaining insurance against lossC. performing contingent planningD. developing planning alternativesE. identification of project risks
A user reports that their thermal wristband printer is printing barcodes that will not scan properly.Which of the following maintenance techniques would MOST likely resolve this issue?() A. Replace the print rollerB. Reset to factory defaultsC. Replace the wristband rollD. Clean the heating assembly
Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?() A. Disable TELNETB. Disable IGMP snoopingC. Enable TELNET but not SSLD. Disable ICMP/ping on device
Which of the following security mitigation techniques is the MOST effective against zero-day attacks?() A.Update antivirus definitionsB.MAC filteringC.Effective security policiesD.User awareness training
Which of the following techniques is NOT used in the Grammar-Translation Method?A.ReadingB.TranslationC.Written workD.Oral presentation
Which of the following techniques is used for tracking the project risks?()A、Probability-Impact matrixB、Pareto chartC、R-ChartD、PERT (Program Evaluation and Review Technique) analysis
A dry cleaner is having issues with their computer overheating. Which of the following preventive maintenance techniques would be the BEST short-term resolution to the problem?()A、Update the firmware on the machine to accommodate for higher temperatures.B、Use Disk Cleanup and Defrag to keep the machine from working as hard.C、Use a can of compressed air to clean out blocked ventilation.D、Relocate the machine to a cooler part of the building.
Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?()A、Disable TELNETB、Disable IGMP snoopingC、Enable TELNET but not SSLD、Disable ICMP/ping on device
Which of the following would BEST optimize a computer that is heavily used? ()A、ScandiskB、DefragC、IndexingD、Chkdsk
Which of the following storage protocols would be suitable for transport across an IP network?()A、 SASB、 SCSIC、 iSCSID、 SATA
An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?()A、Caching enginesB、QoSC、Traffic shapingD、Load balancing
Which of the following wireless security techniques is the MOST secure?()A、Enable Wired Equivalent PrivacyB、Disable SSID broadcastC、Enable Wi-Fi Protected AccessD、Enable MAC filtering
A user reports that their thermal wristband printer is printing barcodes that will not scan properly.Which of the following maintenance techniques would MOST likely resolve this issue?()A、Replace the print rollerB、Reset to factory defaultsC、Replace the wristband rollD、Clean the heating assembly
An administrator needs to configure a server to restrict mail traffic to an application server for security reasons. Which of the following techniques can be used to manage this?()A、 PATB、 ACLsC、 Subnet maskingD、 Port blocking
Which of the following devices would MOST likely integrate a DHCP server?()A、RouterB、HubC、SwitchD、Bridge
Following a system boot,the display indicates that previously detected hardware is missing. Which of the following commands would identify the missing hardware?()A、diagB、lscfgC、cfgmgrD、lsslot
单选题Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()AUpdate antivirus definitionsBMAC filteringCEffective security policiesDUser awareness training
单选题Which of the following terms would best describe the temperature at which a liquid boils at a given pressure?()ADegree of saturationBSaturation temperatureCSuperheated temperatureDDegree of superheat