单选题Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()AHoneynetBHoneypotCVulnerability scannerDNetwork based IDS

单选题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
A

Honeynet

B

Honeypot

C

Vulnerability scanner

D

Network based IDS


参考解析

解析: 暂无解析

相关考题:

Which of the following is BEST for providing network security?() A.FirewallB.DMZC.SwitchD.IDS

Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?() A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS

For security reasons a network technician wants to install a Linux based email server, Microsoftweb services, and directory services on different servers.Which of the following technologies would be BEST to reduce hard ware costs?()A. VPN concentratorB. Virtual serversC. WirelessD. Multimode fiber

Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?() A.IDSB.VPNC.NIPSD.HIDS

A network vulnerability scanner is part of which critical element of network and system security?() A. host securityB. perimeter securityC. security monitoringD. policy management

Which of the following is NOT true of security attacks?[A] Employees will keep up with security polices and awareness if they are highly-trained.[B] The rate of security attacks appears faster than the growth of the Internet.[C] One's computer system will never be secure.[D] Vulnerabilities can go through phones, wireless devices, and network appliances

Which one is the most important based on the following common elements of a network design?()A、Business needsB、Risk analysisC、Security policyD、Best practices

In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()A、A public place where guests are free to access the wireless network.B、A small office where a defined number of specific wireless devices are used.C、A meeting room where various company users will access the wireless network during meetings. D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

A network vulnerability scanner is part of which critical element of network and system security?()A、host securityB、perimeter securityC、security monitoringD、policy management

Which two statements describe the functions and operations of IDS and IPS systems?()A、A network administrator entering a wrong password would generate a true-negative alarm.B、A false positive alarm is generated when an IDS/IPS signature is correctly identified.C、An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.D、Cisco IDS works inline and stops attacks before they enter the network.E、Cisco IPS taps the network traffic and responds after an attack.F、Profile-based intrusion detection is also known as "anomaly detection".

During which phase of the steps to success methodology for Cisco SMB Security Solutions would the Network Readiness Assessment be used to assess the readiness of an existing network infrastructure and determine which,if any modification should be prior to implementation?()A、PrepareB、DesignC、PositionD、DevelopE、PlanF、Perform

Which of the following is BEST for providing network security?()A、FirewallB、DMZC、SwitchD、IDS

For security reasons a network technician wants to install a Linux based email server, Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hard ware costs?()A、VPN concentratorB、Virtual serversC、WirelessD、Multimode fiber

Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A、IDSB、VPNC、NIPSD、HIDS

Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()A、Protocol analyzerB、Vulnerability scannerC、Port scannerD、Penetration test

Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS

Which statement accurately describes firewall user authentication?()A、Firewall user authentication provides another layer of security in a network.B、Firewall user authentication provides a means for accessing a JUNOS Software-based security device.C、Firewall user authentication enables session-based forwarding.D、Firewall user authentication is used as a last resort security method in a network.

单选题During which phase of the steps to success methodology for Cisco SMB Security Solutions would the Network Readiness Assessment be used to assess the readiness of an existing network infrastructure and determine which,if any modification should be prior to implementation?()APrepareBDesignCPositionDDevelopEPlanFPerform

单选题For security reasons a network technician wants to install a Linux based email server, Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hard ware costs?()AVPN concentratorBVirtual serversCWirelessDMultimode fiber

单选题Which of the following is BEST for providing network security?()AFirewallBDMZCSwitchDIDS

单选题Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()AHoneynetBHoneypotCVulnerability scannerDNetwork based IDS

单选题In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()AA public place where guests are free to access the wireless network.BA small office where a defined number of specific wireless devices are used.CA meeting room where various company users will access the wireless network during meetings. DAn office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

单选题A network vulnerability scanner is part of which critical element of network and system security?()A host securityB perimeter securityC security monitoringD policy management

单选题Which of the following would restrict traffic from a specific host to a network?()AMIBsBNASCACLDSMTP

单选题Which statement accurately describes firewall user authentication?()AFirewall user authentication provides another layer of security in a network.BFirewall user authentication provides a means for accessing a JUNOS Software-based security device.CFirewall user authentication enables session-based forwarding.DFirewall user authentication is used as a last resort security method in a network.

单选题A network vulnerability scanner is part of which critical element of network and system security?()Ahost securityBperimeter securityCsecurity monitoringDpolicy management

单选题During which phase of the steps to success methodology for Cisco SMB security solutions would the Network Readiness Assessment be used to assess the readiness of an existing network infrastructure and determine which, if any, modification should be made prior to implementation?()APositionBPrepareCDesignDPerformEPlan

单选题Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()AIDSBVPNCNIPSDHIDS