单选题Which of the following web browser features deters users from visiting spoofed sites?()AAnti-malware detectionBAnti-phishing filtersCAnti-spyware filtersDAntivirus engines

单选题
Which of the following web browser features deters users from visiting spoofed sites?()
A

Anti-malware detection

B

Anti-phishing filters

C

Anti-spyware filters

D

Antivirus engines


参考解析

解析: 暂无解析

相关考题:

WWW is popular for its multimedia transmission and friendly(71). Although the speed of network has been improved considerably in recent years, the rapid(72)of using the Internet, the inherited character of delay in the network and the Request/Response working mode of WWW still make the Internet traffic very(73)and give no guarantee on the Quality of Service. Because HTTP has no states, the web server cannot know the users' demand and the users' requests cannot be predicted Taking advantage of a cache mechanism and the time locality of WWW accesses, the browser can preserve the documents ever accessed in the local machine. By this means, for the documents in the local cache, the browser does not need to send the requests to the remote server or to receive the whole responses from the remote one Pre-fetching uses the space locality of accesses First, the users' access requests are predicted according to the users' current request. Secondly, the expected pages are fetched into the local cache when the user is brow sing the current page. Finally, the users can access these pages downloaded from the local cache. And this can reduce the access delay to some degrees. Pre-fetching is one kind of active caches that can cache the pages which are still not requested by the user. The application of pre-fetching technology in the web can greatly reduce the waiting time after users have sent their requests. This paper brings forward an intelligent technique of web pre-fetching, which can speed up fetching web pages. In this technique, we use a simplified WWW data model to represent the data in the cache of web browser to mine the association rules. We store these rules in a knowledge base so as to(74)the user's actions. In the client sides, the agents are responsible for mining the users' interest and pre-fetching the web pages, which are based on the interest association repository. Therefore it is(75)for the users to speed up the browsing.A.interactiveB.interactionC.interactivityD.infection

Which two UTM features require a license to be activated? ()(Choose two.) A. antispamB. antivirus (full AV)C. content filteringD. Web-filtering redirect

Which three of the following are valid CRS deployment scenarios? ()A、High Availability CRS Engines running on hardware from different server classes B、High Availability CRS Engines running on similar hardware from the same server class but from different vendors C、High Availability CRS Engines and database and a simplex Recording Server D、High Availability CRS Engines and four simplex VoIP Monitoring Servers E、CCM co-resident deployment on an MCS 7815

A web browser need NOT always perform a complete request for a particular page that it suspects mightNOT have changed. The HTTP specification provides a mechanism for the browser to retrieve only a partialresponse from the web server; this response includes information, such as the Last-Modified date but NOTthe body of the page. Which HTTP method will the browser use to retrieve such a partial response?()A、GETB、ASKC、SENDD、HEADE、TRACE

Which of the following web browser features deters users from visiting spoofed sites?()A、Anti-malware detectionB、Anti-phishing filtersC、Anti-spyware filtersD、Antivirus engines

()are web sites that search the web for occurrences of a specified word or phrase.A、InternetB、WWWC、JavaD、Search engines

Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()A、Intrusion detectionB、VirtualizationC、KitingD、Cloning

Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()A、net viewB、ipconfigC、digD、ifconfig

A customer wants to have employees work from remote locations as well as in the office.  All communications must be secure and files must be protected from access by unauthorized people.  The employee’s applications (database inserts and reads) are only accessed with a web browser.  Which of the following capabilities is necessary?()A、SSLB、PGPC、File encryption programD、Public key encryption

You are creating a web form with this HTML: 11. 12. 13. 14. 15. Which HTTP method is used when sending this request from the browser?()A、GETB、PUTC、POSTD、SENDE、FORM

Which two UTM features require a license to be activated? ()(Choose two.)A、antispamB、antivirus (full AV)C、content filteringD、Web-filtering redirect

Your network contains a Web server named Server1 that runs Windows Server 2003 and Internet Information Server (IIS). Server1 has a server certificate from an Enterprise Certificate Authority (CA) installed. External users report that when they try to access the Web site from outside the corporate network by using a Web browser, they receive the following warning message: There is a problem with this Web sites security certificate. The security certificate presented by this Web site was not issued by a trusted certificate authority. You find that users onthe corporate network do not receive this error. You need to ensure that external users do not receive the warning message when connecting to Server1.   What should you do?()A、In IIS Manager, enable the Enable client certificate mapping option.B、In IIS Manager, replace the certificate with a certificate obtained from a public Certification Authority.C、In Local Security Policy, enable Domain Member: Require strong (Windows 2000 or later) session key.D、In Local Security Policy, enable Domain Member: Digitally encrypt or sign secure channel data (always).

单选题Examine the following items, which one offers a variety of security solutions, including firewall, IPS, VPN,antispyware, antivirus, and antiphishing features?()ACisco IOS routerBCisco PIX 500 series security applianceCCisco 4200 series IPS applianceDCisco ASA 5500 series security appliance

单选题Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()Anet viewBipconfigCdigDifconfig

单选题You are creating a web form with this HTML: 11. 12. 13. 14. 15. Which HTTP method is used when sending this request from the browser?()AGETBPUTCPOSTDSENDEFORM

单选题A virus has been removed from the user’s machine, but the user still cannot access the Internet.Which of the following should the technician check NEXT?()ADisable port forwarding on the router.BReboot to Safe Mode and see if the Internet is accessible.CFormat the machine and reinstall the OS.DCheck the web browser’s proxy settings.

单选题Which of the following features would hide internal IP addresses from the Internet?()ANetwork Address TranslationBPort forwardingCQuality of ServiceDSSID broadcast

单选题Which of the following statements is true according to the passage?AThe address system was used to make web pages.BThe World Wide Web was created in Switzerland.CThe fist web browser was very expensive to buyDMany people could use the Internet before 1990

单选题Your network contains a Web server named Server1 that runs Windows Server 2003 and Internet Information Server (IIS). Server1 has a server certificate from an Enterprise Certificate Authority (CA) installed. External users report that when they try to access the Web site from outside the corporate network by using a Web browser, they receive the following warning message: There is a problem with this Web sites security certificate. The security certificate presented by this Web site was not issued by a trusted certificate authority. You find that users onthe corporate network do not receive this error. You need to ensure that external users do not receive the warning message when connecting to Server1.   What should you do?()AIn IIS Manager, enable the Enable client certificate mapping option.BIn IIS Manager, replace the certificate with a certificate obtained from a public Certification Authority.CIn Local Security Policy, enable Domain Member: Require strong (Windows 2000 or later) session key.DIn Local Security Policy, enable Domain Member: Digitally encrypt or sign secure channel data (always).

单选题Which of the following steps does a customer use to upgrade the firmware on the AMM to the latest level?()AOpen a Web browser and log on to the IMM; in the navigation frame, click IMM Firmware Update under IMM Control; click Browse; select the .exe file; click the Upgrade/Update button BTFTP to the AMM; from the Main Menu, select Update; browse to the downloaded .exe file CTelnet to AMM; from the Main Menu, select Update; browse to the downloaded .pkt file DOpen a Web browser and log on to the AMM; in the navigation frame, click AMM Firmware Update under AMM Control; click Browse; select the .pkt file; click the Upgrade/Update button

多选题Which three of the following are valid CRS deployment scenarios? ()AHigh Availability CRS Engines running on hardware from different server classesBHigh Availability CRS Engines running on similar hardware from the same server class but from different vendorsCHigh Availability CRS Engines and database and a simplex Recording ServerDHigh Availability CRS Engines and four simplex VoIP Monitoring ServersECCM co-resident deployment on an MCS 7815

单选题()are web sites that search the web for occurrences of a specified word or phrase.AInternetBWWWCJavaDSearch engines

单选题Which of the following features sets IBM apart from competitors in the area of partitioning?()ASoftware supportBHardware isolationCStatic changes in partitionsDMicro-Partitioning

单选题Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address.  Which of the following tools would allow the administrator to test name resolution?()A net viewB ipconfigC digD ifconfig

单选题A customer wants to have employees work from remote locations as well as in the office.  All communications must be secure and files must be protected from access by unauthorized people.  The employee’s applications (database inserts and reads) are only accessed with a web browser.  Which of the following capabilities is necessary?()ASSLBPGPCFile encryption programDPublic key encryption

单选题Your network contains a stand-alone certification authority (CA) and a Web server. The Web server hosts a secure Web site. The Web site uses a server certificate that was issued from the CA. Users report that they receive a certificate warning message when they connect to the Web site. You need to prevent users from receiving the certificate warning message when they connect to the Web site. What should you do from the Internet Options in Internet Explorer?()AImport the CA certificate to the trusted root CA certificate store. BImport the server authentication certificate to the trusted publishers certificate store.CClear the Check for publisher's certificate revocation check box. DClear the Require server verification (https:) for all sites in this zone check box for the Trusted sites zone.

单选题A web browser need NOT always perform a complete request for a particular page that it suspects mightNOT have changed. The HTTP specification provides a mechanism for the browser to retrieve only a partialresponse from the web server; this response includes information, such as the Last-Modified date but NOTthe body of the page. Which HTTP method will the browser use to retrieve such a partial response?()AGETBASKCSENDDHEADETRACE