单选题TippingPoint IPS对应用保护的过滤器分为哪几类?()AAttack Pretection,Reconnaissance,Security Policy,InformationalBAttack Pretection,Scan,Security Policy,InformationalCAttack Pretection,Reconnaissance,MisuserAbuse,InformationalDAttack Pretectio,Scan,Security Policy,MisuserAbuse

单选题
TippingPoint IPS对应用保护的过滤器分为哪几类?()
A

Attack Pretection,Reconnaissance,Security Policy,Informational

B

Attack Pretection,Scan,Security Policy,Informational

C

Attack Pretection,Reconnaissance,Misuser&Abuse,Informational

D

Attack Pretectio,Scan,Security Policy,Misuser&Abuse


参考解析

解析: 暂无解析

相关考题:

Which of the following security threats involves making phone calls?() A.PhishingB.VishingC.DDoSD.Xmas attack

Which method is of gaining access to a system that bypasses normal security measures?()A、Starting a Smurf attackB、Conducting social engineeringC、Creating a back doorD、Launching a DoS attack

Which two configuration elements are required for a policy-based VPN?()A、IKE gatewayB、secure tunnel interfaceC、security policy to permit the IKE trafficD、security policy referencing the IPsec VPN tunnel

You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()A、Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer accountB、Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checksC、Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security templateD、On the IIS server, run the gpresult command from a command prompt and analyze the output

Which statement describes the behavior of a security policy?()A、The implicit default security policy permits all traffic.B、Traffic destined to the device itself always requires a security policy.C、Traffic destined to the device’s incoming interface does not require a security policy.D、The factory-default configuration permits all traffic from all interfaces.

Which three statements are true regarding IDP?()A、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.B、IDP inspects traffic up to the Application layer.C、IDP searches the data stream for specific attack patterns.D、IDP inspects traffic up to the Presentation layer.E、IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.

过滤器的响应动作可以根据过滤器的保护类型进行配置,下列哪几类保护类型属于Application rotection?()A、Attack ProtectionB、ReconnaissanceC、Traffic NormalizationsD、Network Equipment ProtectionE、Security PolicyF、Informational

BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate whatclassification of attack?()A、Sniffing attackB、Denial of service attackC、Port Scan attackD、Reconnaisance attackE、Spoofing attack

TippingPoint IPS对应用保护的过滤器分为哪几类?()A、Attack Pretection,Reconnaissance,Security Policy,InformationalB、Attack Pretection,Scan,Security Policy,InformationalC、Attack Pretection,Reconnaissance,MisuserAbuse,InformationalD、Attack Pretectio,Scan,Security Policy,MisuserAbuse

When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()A、Third-party due diligence policy reviewB、Remote Access PolicyC、Encryption PolicyD、Application change control policyE、Security Personnel policy

Which of the following security threats involves making phone calls?()A、PhishingB、VishingC、DDoSD、Xmas attack

What are three configuration objects used to build JUNOS IDP rules?()A、zone objectsB、policy objectsC、attack objectsD、alert and notify objectsE、network and address objects

What are three main phases of an attack?()A、DoSB、exploitC、propagationD、port scanningE、reconnaissance

What is the function of Host Checker?()A、To allow clientless access to the networkB、To restrict access to protected resources on the networkC、To scan an endpointfor compliance with security policiesD、To push a firewall policy to the endpoint's local firewall application

You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()A、Use Security Templates to correct the setting and export the security file.B、Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.C、Use Secedit /RefreshPolicy Machine_Policy command.D、Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.

You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()A、Use secedit.exe to refresh the security policy.B、Use the local computer policy to configure the local security policy.C、Use security configuration and analysis to support the security files as a .pol file.D、Use computer management to configure the security policy setting.

You are the network administrator for . The network consists of single Active directory domain. The domain contains a Windows Server 2003 domain controller named TestKing3. The securews.inf security policy has been applied to the domain. A network application requires a service account. The network application runs constantly. You create and configure a service account named SrvAcct for the network application. The software functions properly using the new account and service. You discover an ongoing brute force attack against the SrvAcct account. The intruder appears to be attempting a distributed attack from several Windows XP Professional domain member computers on the LAN. The account has not been compromised and you are able to stop the attack, you restart Server6 and attempt to run the network application, but the application does not respond.()A、Reset the SrvAcct password,B、Configure the default Domain Controllers policy to assign the SrvAcct account the right to log on locally.C、Unlock the SrvAcct account.D、Restart the NetAppService service.

单选题BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate whatclassification of attack?()ASniffing attackBDenial of service attackCPort Scan attackDReconnaisance attackESpoofing attack

单选题You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()ALog on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer accountBRun the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checksCRun Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security templateDOn the IIS server, run the gpresult command from a command prompt and analyze the output

单选题You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()AUse secedit.exe to refresh the security policy.BUse the local computer policy to configure the local security policy.CUse security configuration and analysis to support the security files as a .pol file.DUse computer management to configure the security policy setting.

单选题What is the function of Host Checker?()ATo allow clientless access to the networkBTo restrict access to protected resources on the networkCTo scan an endpointfor compliance with security policiesDTo push a firewall policy to the endpoint's local firewall application

单选题Which statement describes the behavior of a security policy?()AThe implicit default security policy permits all traffic.BTraffic destined to the device itself always requires a security policy.CTraffic destined to the device’s incoming interface does not require a security policy.DThe factory-default configuration permits all traffic from all interfaces.

单选题Which method is of gaining access to a system that bypasses normal security measures?()AStarting a Smurf attackBConducting social engineeringCCreating a back doorDLaunching a DoS attack

单选题Which of the following security threats involves making phone calls?()APhishingBVishingCDDoSDXmas attack

单选题You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()AUse Security Templates to correct the setting and export the security file.BUse Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.CUse Secedit /RefreshPolicy Machine_Policy command.DUse the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.

单选题You are the network administrator for . The network consists of single Active directory domain. The domain contains a Windows Server 2003 domain controller named TestKing3. The securews.inf security policy has been applied to the domain. A network application requires a service account. The network application runs constantly. You create and configure a service account named SrvAcct for the network application. The software functions properly using the new account and service. You discover an ongoing brute force attack against the SrvAcct account. The intruder appears to be attempting a distributed attack from several Windows XP Professional domain member computers on the LAN. The account has not been compromised and you are able to stop the attack, you restart Server6 and attempt to run the network application, but the application does not respond.()AReset the SrvAcct password,BConfigure the default Domain Controllers policy to assign the SrvAcct account the right to log on locally.CUnlock the SrvAcct account.DRestart the NetAppService service.

单选题TippingPoint IPS对应用保护的过滤器分为哪几类?()AAttack Pretection,Reconnaissance,Security Policy,InformationalBAttack Pretection,Scan,Security Policy,InformationalCAttack Pretection,Reconnaissance,MisuserAbuse,InformationalDAttack Pretectio,Scan,Security Policy,MisuserAbuse

单选题You need to design a strategy to ensure that all servers are in compliance with the business requirements for maintaining security patches. What should you do?()ALog on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the domainBLog on to each server and run Security Configuration and Analysis to analyze the security settings by using a custom security templateCCreate a logon script to run the secedit command to analyze all servers in the domainDRun the Microsoft Baseline Security Analyzer (MBSA) on a server to scan for Windows vulnerabilities on all servers in the domain