单选题Which software-based security threat is typically spread from user to user via e-mail?()AVirusBTrojan horseCDenial of serviceDData interception
单选题
Which software-based security threat is typically spread from user to user via e-mail?()
A
Virus
B
Trojan horse
C
Denial of service
D
Data interception
参考解析
解析:
暂无解析
相关考题:
What information does the Junos Pulse Access Control Service provide to Security Threat Response Manager (STRM)?() A. Session lengthB. User browser informationC. Session IP addressD. User identity information
Which software-based security threat is typically spread from user to user via e-mail?() A.Data interceptionB.VirusC.Trojan horseD.Denial of service
Which form of DSL technology is typically used as a replacement for T1 lines?()A、VDSLB、HDSLC、ADSLD、SDSL
Which three critical elements does the Cisco Integrated Security Solution incorporate?()A、Cisco Storage SolutionB、Cisco Threat Defense SolutionC、Cisco Trust and Identity Management SolutionD、Cisco Switching SolutionE、Cisco Content Networking SolutionF、Cisco Secure Connectivity
All-in-one UTM security gateways are starting to displace routers in many small business networks. What does UTM stand for?()A、 United Threat MonitorB、 Universal Threat ManagerC、 Unified Threat ManagementD、 Ultimate Threat Monitoring
Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()A、 Cisco SDM Security AuditB、 Cisco Security MARSC、 Cisco Security Agent MCD、 Cisco Security IntelliShieldE、 CAN
What are three characteristics that buyers of Cisco Small Business routers typically look for?()A、 basic security optionsB、 simple network configurationC、 advanced network configurationD、 integrated solutionsE、 advanced security optionsF、 point products
What are three benefits of the Cisco Adaptive Threat Defense strategy? (Choose three.) ()A、 using QoS techniques such as Traffic Policing to rate limit suspected traffic to prevent DoS attacksB、 automatic reconfiguration s of the security devices based on current security threatsC、 containment and control of security threatsD、 application securityE、 anti-x defense F- virtual firewall
What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()A、The ability to detect and prevent malicious traffic.B、The ability to associate security breaches with a specific user.C、Converged management of network and security events, network flow data, and identity information.D、Consistent device management across administrative realms.
The Cisco Unified Wireless Network minimizes the TCO and maximizes woreless network uptime by optimizing which two deployment, management, and security features?()A、 unified wireless and wired infrastructure for a single point of control for all WLAN trafficB、 simplified management of central or remotely located access pointsC、 extension features to wired network services, such as denial of service prevention and ACLsD、 threat defense with a robust wired IDS
Which of the following are examples of physical security measures?()A、Policies and proceduresB、EncryptionC、Locked doorsD、Security personnelE、Backup tapes
A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A、WormB、SmurfC、Logic BombD、Man-in-the-middle
单选题Which of the following is typically collected during the server baselining process?()A The vendor documentation and knowledgebaseB Compliance of local lawsC Server performance statisticsD Microsoft Baseline Security Analyzer output
多选题What are three benefits of the Cisco Adaptive Threat Defense strategy? (Choose three.) ()Ausing QoS techniques such as Traffic Policing to rate limit suspected traffic to prevent DoS attacksBautomatic reconfiguration s of the security devices based on current security threatsCcontainment and control of security threatsDapplication securityEanti-x defense F- virtual firewall
单选题Fire may be spread by which means?()AConduction of heat to adjacent surfacesBDirect radiationCConvectionDAll of the above
单选题When the ship security alert system is activated, it shall not()Ainitiate a ship-to-shore security alertBtransmit a ship-to-shore security alertCinitiate an alert identifying the ship, its locationDraise a security alarm on-board the ship indicating that the ship is under threat
单选题Which statement accurately describes firewall user authentication?()AFirewall user authentication provides another layer of security in a network.BFirewall user authentication provides a means for accessing a JUNOS Software-based security device.CFirewall user authentication enables session-based forwarding.DFirewall user authentication is used as a last resort security method in a network.
单选题Which software-based security threat is typically spread from user to user via e-mail?()AData interceptionBVirusCTrojan horseDDenial of service
多选题List three benefits of implementing an integrated security solution based on the Cisco Self- Defending Network strategy? (Choose three.)()Aintegrated securityBcollaborative security systemCself provisioningDAdaptive Threat DefenseEprogrammable security ASICsFCisco lOS-based security
多选题What information does the Junos Pulse Access Control Service provide to Security Threat Response Manager (STRM)?()ASession lengthBUser browser informationCSession IP addressDUser identity information
多选题Which three critical elements does the Cisco Integrated Security Incorporate?()ACisco Trust and Identity Management SolutionBCisco Secure Connectivity SolutionCCisco Threat Defense SolutionDCisco Switching SolutionECisco Storage SolutionFCisco Content Networking Solution
单选题Which type of security will allow businesses to focus on achieving business goals?()Apoint-product securityBendpointsecurityCnetwork infrastructure securityDsecure access and threat defense
单选题All-in-one UTM security gateways are starting to displace routers in many small business networks. What does UTM stand for?()A United Threat MonitorB Universal Threat ManagerC Unified Threat ManagementD Ultimate Threat Monitoring
单选题Which operational mode command displays all active IPsec phase 2 security associations?()Ashow ike security-associationsBshow ipsec security-associationsCshow security ike security-associationsDshow security ipsec security-associations
单选题In order to communicate the threat at a port facility or for a ship, the Contracting Government will set the appropriate security levels Security level 1 corresponds to()Anormal situationsBmedium situationsChigh threat situationsDspecial situations
多选题What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()AThe ability to detect and prevent malicious traffic.BThe ability to associate security breaches with a specific user.CConverged management of network and security events, network flow data, and identity information.DConsistent device management across administrative realms.
单选题Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()A Cisco SDM Security AuditB Cisco Security MARSC Cisco Security Agent MCD Cisco Security IntelliShieldE CAN
多选题What are three characteristics that buyers of Cisco Small Business routers typically look for?()Abasic security optionsBsimple network configurationCadvanced network configurationDintegrated solutionsEadvanced security optionsFpoint products