单选题Which firewall best practices can help mitigate worm and other automated attacks?()ASegment security zonesBRestrict access to firewallsCUse logs and alertsDSet connection limits

单选题
Which firewall best practices can help mitigate worm and other automated attacks?()
A

Segment security zones

B

Restrict access to firewalls

C

Use logs and alerts

D

Set connection limits


参考解析

解析: 暂无解析

相关考题:

Each student can have a terminal to use now, which can help them study.()

You can meet people()can possibly help you find a paid job later on.A. thatB. whoC. which

● The Rational Unified Process (RUP) is a software engineering process, which captures any of best practices in modern software development. The notions of (71) and scenarios ave been proven to be an excellent way to capture function requirements. RUP can be described two dimensions – time and content. In the time dimension, the software lifecycle is broken into cycles. Each cycle is divided into four consecutive (72) which is concluded with awell-defined (73) and can be further broken down into (74) – a complete developmentloop resulting in a release of an executable product, a subset of the final product underdevelopment, which grows incrementally to become the final system. The content structurerefers to the disciplines, which group (75) logically by nature.

Which of the following types of software protection will help mitigate any threats coming fromworms or Trojans?() A. Spam blockerB. Anti-VirusC. Anti SpywareD. Anti adware

A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat() A. Incident responseB. Asset managementC. Patch managementD. Policies and procedures

offer the help to which you need, or can at least give you 83. ____________

Which of the following activities can help develop the skill of listening for gistA.Listen and find out where Jim lives.B.Listen and decide on the best title for the passage.C.Listen and underline the words the speaker stresses.D.Listen to pains of words and tell if they are the same.

Which of the following activities can help develop the skill of listening for gist? A. Listen and find out where Jim lives. B. Listen and decide on the best title for the passage. C. Listen and underline the words the speaker stresses. D. Listen to pairs of words and tell if they are the same.

Which one is the most important based on the following common elements of a network design?()A、Business needsB、Risk analysisC、Security policyD、Best practices

A WORM drive can be equated to which of the following common technologies?()A、 CDRWB、 CDRC、 Flash MediaD、 DVDRW

A corporation wants help in reducing backup costs. By proposing a library with LTO-5 drives,which one of the following would be the BEST reason to choose LTO-5 over LTO-4?()A、WORM and encryption capability B、offers sequential stream of batch data C、offers ability to read and write multiple generation cartridges D、lower cost per GB when compared to LTO-4

Which two statements are true about firewall filter configurations?()A、Multiple action modifiers can be included in the same term.B、Only a single action modifier can be included in the same term.C、The default term within a firewall filter uses the discard action.D、The default term within a firewall filter uses the reject action.

Which two statements are correct about firewall filters in the Junos OS?()A、Firewall filters are stateless.B、Firewall filters are used to control routing information that is exchanged between devices.C、Firewall filters are used to control traffic passing through the device.D、Firewall filters can only be applied to traffic entering the device.

BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate whatclassification of attack?()A、Sniffing attackB、Denial of service attackC、Port Scan attackD、Reconnaisance attackE、Spoofing attack

What is a virtual firewall?()A、another name for a firewall deployed in routed modeB、another name for a firewall deployed in transparent modeC、a separation of multiple firewall security contexts on a single firewallD、a firewall that, when deployed in routed mode, can support up to 1000 VLANs per contextE、a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)

Which firewall best practices can help mitigate worm and other automated attacks?()A、Segment security zonesB、Restrict access to firewallsC、Use logs and alertsD、Set connection limits

A client has a need to look at and add many image files but has no need to change them. Which of the following media types would BEST meet the client’s needs?()A、CD-RWB、DiskC、FlashD、WORM

A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat()A、Incident responseB、Asset managementC、Patch managementD、Policies and procedures

Which of the following types of software protection will help mitigate any threats coming fromworms or Trojans?()A、Spam blockerB、Anti-VirusC、Anti SpywareD、Anti adware

单选题What is a virtual firewall?()Aanother name for a firewall deployed in routed modeBanother name for a firewall deployed in transparent modeCa separation of multiple firewall security contexts on a single firewallDa firewall that, when deployed in routed mode, can support up to 1000 VLANs per contextEa firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)

单选题Which of the following is the BEST way for Karen, a technician, to mitigate phishing attempts?()AInstalling antivirusBReconfiguring the firewallCChanging the permissions and passwordsDEducating the end user

单选题A WORM drive can be equated to which of the following common technologies?()A CDRWB CDRC Flash MediaD DVDRW

单选题You are implementing basic switch security best practices.  Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?()AMake all ports private VLAN ports.BPlace all unused ports in native VLAN 1 until needed.CProactively configure unused switch ports as access ports.DDisable Cisco Discovery Protocol globally.

多选题Which two firewall user authentication objects can be referenced in a security policy?()Aaccess profileBclient groupCclientDdefault profile

单选题By default, which command can be used to display information about packets that have been logged with the syslog firewall filter action?()Ashow logBshow firewallCshow log messagesDshow firewall log

多选题Which two commands can be used to monitor firewall user authentication?()Ashow access firewall-authenticationBshow security firewall-authentication usersCshow security audit logDshow security firewall-authentication history

单选题BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate whatclassification of attack?()ASniffing attackBDenial of service attackCPort Scan attackDReconnaisance attackESpoofing attack

单选题Which of the following activities can help develop the skill of listening for gist?AListen and find out where Jim lives.BListen and decide on the best title for the passage.CListen and underline the words the speaker stresses.DListen to pains of words and tell if they are the same.