单选题Which statement is correct about HTTP trickling?()AIt prevents the HTTP client or server from timing-out during an antivirus updateBIt prevents the HTTP client or server from timing-out during antivirus scanning.CIt is an attack.DIt is used to bypass antivirus scanners.

单选题
Which statement is correct about HTTP trickling?()
A

It prevents the HTTP client or server from timing-out during an antivirus update

B

It prevents the HTTP client or server from timing-out during antivirus scanning.

C

It is an attack.

D

It is used to bypass antivirus scanners.


参考解析

解析: 暂无解析

相关考题:

Your network contains a Windows Server Update Services (WSUS) server. A Group Policy object (GPO) configures all WSUS client computers to detect updates hourly and install updates weekly.You download a critical update.You need to ensure that the WSUS client computers install the critical update during the next detection interval.What should you do?()A. From the client computers, run wuauclt.exe /force.B. From the client computers, run gpupdate.exe /force.C. From the server, configure the deadline settings.D. From the server, configure the Synchronization Schedule options.

( )is a client/server protocol for transferring files across the Internet.A.POP3B.IMAPC.FTPD.HTTP

(72)is a client/server protocol for transferring files across the Internet.A.POP3B.IMAPC.FTPD.HTTP

Originally introduced by Netscape Communications,(21)are a general mechanism which HTTP Server side applications, such as CGI(22), can use to both store and retrieve information on the HTTP(23)side of the connection. Basically, Cookies can be used to compensate for the(24)nature of HTTP. The addition of a simple, persistent, client-side state significantly extends the capabilities of WWW-based(25).A.BrowsersB.CookiesC.ConnectionsD.Scripts

Which statement is correct about HTTP trickling?() A. It prevents the HTTP client or server from timing-out during an antivirus updateB. It prevents the HTTP client or server from timing-out during antivirus scanning.C. It is an attack.D. It is used to bypass antivirus scanners.

Originally-introduced by Netscape Communications,(31)are a general mechanism which HTTP Server side applications, such as CGI(32), can use to both store and retrieve information on the HTTP(33)side of the connection. Basically, Cookies can be used to compensate for the(34)nature of HTTP. The addition ora simple, persistent, client-side state significantly extends the capabilities of WWW-based(35).A.BrowsersB.CookiesC.ConnectionsD.Scripts

The Hypertext Transfer Protocol , the Web's ( ) protocol , is at the heart of the Web. HTTP is implemented in two programs : a ( ) program and a server program . The client program and server program executing on different end systems , talk to each other by (请作答此空) HTTP messages . HTTP defines how Web clients request Web pages from servers and how servers transfer web pages to clients . when a user ( ) a web page , the browser sends http request messages for the objects in the page to the server . The server ( ) the requests and responds with http response messages that contain the objects .A.exchangingB.changingC.decliningD.removing

The Hypertext Transfer Protocol , the Web's (请作答此空) protocol , is at the heart of the Web. HTTP is implemented in two programs : a ( ) program and a server program . The client program and server program executing on different end systems , talk to each other by ( ) HTTP messages . HTTP defines how Web clients request Web pages from servers and how servers transfer web pages to clients . when a user ( ) a web page , the browser sends http request messages for the objects in the page to the server . The server ( ) the requests and responds with http response messages that contain the objects .A.transport-layerB.application-layerC.network-layerD.link-layer

The Hypertext Transfer Protocol,the Web's(请作答此空)protocol,is at the heart of the Web.HTTP is implemented in two programs:a( )program and a server program.The client program and server program executing on different end systems,talk to each other by( )HTTP messages.HTTP defines how Web clients request Web pages from servers and how servers transfer web pages to clients.when a user( )a web page,the browser sends http request messages for the objects in the page to the server.The server( )the requests and responds with http response messages that contain the objects.A.transport-layerB.application-layerC.network-layerD.link-layer

Which statement is correct regarding the operation of DHCP?()A、A DHCP client uses a ping to detect address conflicts.(ARP)B、A DHCP server uses a gratuitous ARP to detect DHCP clients.C、A DHCP client uses a gratuitous ARP to detect a DHCP server.D、If an address conflict is detected, the address is removed from the pool and an administrator must resolve the conflict.E、If an address conflict is detected, the address removed from the pool for an amount of time configurable by the administrator.F、If an address conflict is detected, the address is removed from the pool and will not be reused until server is rebooted.

Your network has a main office and a branch office. The branch office has five client computers that runWindows 7 and a server that runs Windows Server 2008 R2. The branch office server is enabled for branchCache. You need to configure Windows Firewall on each client computer so that cached content canbe retrieved from the branch office server.  Which firewall rule should you enable on the client computers?()A、BranchCache - Content Retrieval (Uses HTTP)B、BranchCache - Hosted Cache Server (Uses HTTPS)C、BranchCache - Peer Discovery (Uses WSD)D、File and Printer Sharing

Which two statistical data types are available on the statistics page of the WebUI? ()(Choose two.)A、cache statisticsB、client browser typeC、server response timeD、HTTP response codes

If a certificate authority trustpoint is not configured when enabling HTTPS and the remote HTTPS server requires client authentication, connections to the secure HTTP client will fail. Which command must be enabled for correct operation?()A、ip http client secure-ciphersuite 3des-ede-cbc-shaB、ip https max-connections 10C、ip http timeout-policy idle 30 life 120 requests 100D、ip http client secure-trustpoint trustpoint-name

Which statement about the DVS engine is true?()A、the DVS engine can useWebroot and McAfee scanning in parallelB、the DVS engine generates the WBRSC、the DVS engine never inspects the client HTTP requestD、the DVS engine is only used for Layer 4 traffic monitoring

A web server is running correctly but sending a RST packet to any client trying to connect using HTTP on TCP port 80. Which of the following tools should be used to determine the listening port of the web server?()A、RouteB、IfconfigC、NetstatD、Nslookup

Which the HTTP method represents a request for information about the supported methods on an HTTP server?()A、 GETB、 INFOC、 HEADD、 TRACEE、 OPTIONS

Which configuration command prevents a client from establishing multiple PPPoE connections from a single workstation?()A、sessionsB、sa-validateC、split-horizonD、duplicate-protection

Which statement is correct about HTTP trickling?()A、It prevents the HTTP client or server from timing-out during an antivirus updateB、It prevents the HTTP client or server from timing-out during antivirus scanning.C、It is an attack.D、It is used to bypass antivirus scanners.

The direct handoff connection method to an Oracle9i Shared Server involves fewer messages than in previous releases of the multithreaded architecture. Which type of message has been eliminated?()A、The initial request from the client to the listener.B、Messages between the dispatcher and the shared server background processes.C、A redirect message from the listener to the client during client connections.D、Round-trip messages between the listener and the shared server background processes.

Your network contains a Windows Server Update Services (WSUS) server. A Group Policy object (GPO) configures all WSUS client computers to detect updates hourly and install updates weekly.You download a critical update.You need to ensure that the WSUS client computers install the critical update during the next detection interval. What should you do?()A、From the client computers, run wuauclt.exe /force.B、From the client computers, run gpupdate.exe /force.C、From the server, configure the deadline settings.D、From the server, configure the Synchronization Schedule options.

单选题A web server is running correctly but sending a RST packet to any client trying to connect using HTTP on TCP port 80. Which of the following tools should be used to determine the listening port of the web server?()ARouteBIfconfigCNetstatDNslookup

单选题The direct handoff connection method to an Oracle9i Shared Server involves fewer messages than in previous releases of the multithreaded architecture. Which type of message has been eliminated?()AThe initial request from the client to the listener.BMessages between the dispatcher and the shared server background processes.CA redirect message from the listener to the client during client connections.DRound-trip messages between the listener and the shared server background processes.

单选题Which configuration command prevents a client from establishing multiple PPPoE connections from a single workstation?()AsessionsBsa-validateCsplit-horizonDduplicate-protection

单选题Which the HTTP method represents a request for information about the supported methods on an HTTP server?()A GETB INFOC HEADD TRACEE OPTIONS

单选题Your network has a main office and a branch office. The branch office has five client computers that runWindows 7 and a server that runs Windows Server 2008 R2. The branch office server is enabled for branchCache. You need to configure Windows Firewall on each client computer so that cached content canbe retrieved from the branch office server.  Which firewall rule should you enable on the client computers?()ABranchCache - Content Retrieval (Uses HTTP)BBranchCache - Hosted Cache Server (Uses HTTPS)CBranchCache - Peer Discovery (Uses WSD)DFile and Printer Sharing

单选题If a certificate authority trustpoint is not configured when enabling HTTPS and the remote HTTPS server requires client authentication, connections to the secure HTTP client will fail. Which command must be enabled for correct operation?()Aip http client secure-ciphersuite 3des-ede-cbc-shaBip https max-connections 10Cip http timeout-policy idle 30 life 120 requests 100Dip http client secure-trustpoint trustpoint-name

单选题Which statement about the DVS engine is true?()Athe DVS engine can useWebroot and McAfee scanning in parallelBthe DVS engine generates the WBRSCthe DVS engine never inspects the client HTTP requestDthe DVS engine is only used for Layer 4 traffic monitoring