Which antivirus solution integrated on branch SRX Series devices do you use to ensure maximum virus coverage for network traffic?()A、express AVB、full AVC、desktop AVD、ICAP
Which antivirus solution integrated on branch SRX Series devices do you use to ensure maximum virus coverage for network traffic?()
- A、express AV
- B、full AV
- C、desktop AV
- D、ICAP
相关考题:
Your network has Network Access Protection (NAP) deployed. The network contains two servers named Server1 and Server2. Server1 is a Network Policy Server (NPS). Server2 has a third-party antivirus solution installed.Server1 is configured to use a custom system health validator provided by the antivirus vendor. The system health validator uses Server2 to identify the version of the current antivirus definition.You need to ensure that NAP clients are considered noncompliant if Server1 cannot connect to Server2.Which error code resolution setting should you configure?()A. SHA not responding to NAP clientB. SHA unable to contact required servicesC. SHV not respondingD. SHV unable to contact required services
Which antivirus solution integrated on branch SRX Series devices do you use to ensure maximum virus coverage for network traffic?() A. express AVB. full AVC. desktop AVD. ICAP
Which statement is correct about HTTP trickling?() A. It prevents the HTTP client or server from timing-out during an antivirus updateB. It prevents the HTTP client or server from timing-out during antivirus scanning.C. It is an attack.D. It is used to bypass antivirus scanners.
You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()A. Enhanced Endpoint SecurityB. DP signaturesC. Antivirus licensingD. Endpoint Security Assessment Plug-in
Which of the following security mitigation techniques is the MOST effective against zero-day attacks?() A.Update antivirus definitionsB.MAC filteringC.Effective security policiesD.User awareness training
Which cleaning product should be used for the inside of a computer?()A、glass cleanerB、a simple ammonia and water solution followed by an antistatic solutionC、a bleach solution followed by waterD、compressed air
Which of the following is a benefit of having a Solution Assurance?()A、The need to involve solution experts is removedB、Financial justification of the proposal is enhancedC、Time required to design a solution is decreasedD、Complex solutions are simplified considerably
You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()A、Enhanced Endpoint SecurityB、DP signaturesC、Antivirus licensingD、Endpoint Security Assessment Plug-in
Which of the following web browser features deters users from visiting spoofed sites?()A、Anti-malware detectionB、Anti-phishing filtersC、Anti-spyware filtersD、Antivirus engines
Which of the following statements best describes a Pre-sales Solution Assurance Review?()A、An account team proposal reviewB、An installation planning meetingC、A solution design development methodologyD、A technical inspection of a completed solution design
Which of the following should be kept in uninterruptible power supply (UPS) documentation records?()A、Antivirus software versionB、Battery replacement dateC、Wire shelving diagramD、IP address for network printerE、Shutdown delay timing
Which of the following is the BEST way to prevent social engineering tactics?()A、End user trainingB、Antivirus softwareC、Group policyD、Encryption
Computers on the network are frequently infected with viruses, malware, worms and Trojans.Which of the following should Mike, a technician, update automatically to prevent future problems?()A、Antivirus signaturesB、Antivirus enginesC、Malware enginesD、Virus encyclopedias
A customer needs a new database server. Their third-party application requires Microsoft SQL Server. They have 100 users who will login to the network and store their data files on the network server. They will also require the server to be an email server and to deploy a central antivirus solution. Which of the following network operating systems would satisfy these requirements?()A、SuSE Linux Enterprise 9B、Red Hat Linux Advanced Server 3C、Microsoft Windows 2003 Server Web EditionD、Microsoft Windows 2003 Server Standard Edition
Which two UTM features require a license to be activated? ()(Choose two.)A、antispamB、antivirus (full AV)C、content filteringD、Web-filtering redirect
Which statement is correct about HTTP trickling?()A、It prevents the HTTP client or server from timing-out during an antivirus updateB、It prevents the HTTP client or server from timing-out during antivirus scanning.C、It is an attack.D、It is used to bypass antivirus scanners.
单选题A technician works for a company that has recently been affected by a virus. The virus entered the network by using port 6000. Port 6000 is used by an application located on a server. The technician has been asked to block this port on all servers and computers except for the one server which uses this port. Which of the following should the technician do?()AUpdate the antivirus applicationBInstall critical update security patchesCAdjust the software firewall settingsDReplace the current antivirus program
多选题Which two WLAN implementation statements are true?()AAn autonomous wireless solution includes lightweight APs and WLAN controllers. The APs and the WLAN controllers are managed by a WLAN solution engine (WLSE/WLSM).BAn autonomous wireless solution includes lightweight APs and WLAN controllers. The APs and the WLAN controllers are managed by the Cisco Wireless Control System (WCS).CA lightweight wireless solution includes lightweight APs and WLAN controllers. The APs and the WLAN controllers are managed by a WLAN solution engine (WLSE/WLSM).DA lightweight wireless solution consists of autonomous access points (APs), which are managed by a WLAN solution engine (WLSE/WLSM).EA lightweight wireless solution includes lightweight APs and WLAN controllers. The APs and the WLAN controllers are managed by the Cisco Wireless Control System (WCS).
单选题Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()AUpdate antivirus definitionsBMAC filteringCEffective security policiesDUser awareness training
单选题Which antivirus solution integrated on branch SRX Series devices do you use to ensure maximum virus coverage for network traffic?()Aexpress AVBfull AVCdesktop AVDICAP
单选题Your network has Network Access Protection (NAP) deployed. The network contains two servers named Server1 and Server2. Server1 is a Network Policy Server (NPS). Server2 has a third-party antivirus solution installed.Server1 is configured to use a custom system health validator provided by the antivirus vendor. The system health validator uses Server2 to identify the version of the current antivirus definition.You need to ensure that NAP clients are considered noncompliant if Server1 cannot connect to Server2.Which error code resolution setting should you configure?()ASHA not responding to NAP clientBSHA unable to contact required servicesCSHV not respondingDSHV unable to contact required services
单选题A technician finished installing antivirus software. Which of the following should the technician perform NEXT?()ARun a full scan on the local disk.BRemove infected files.CUpdate antivirus signatures.DQuarantine infected files
单选题Which of the following is a benefit of having a Solution Assurance?()AThe need to involve solution experts is removedBFinancial justification of the proposal is enhancedCTime required to design a solution is decreasedDComplex solutions are simplified considerably
单选题Which statement is correct about HTTP trickling?()AIt prevents the HTTP client or server from timing-out during an antivirus updateBIt prevents the HTTP client or server from timing-out during antivirus scanning.CIt is an attack.DIt is used to bypass antivirus scanners.
单选题You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()AEnhanced Endpoint SecurityBDP signaturesCAntivirus licensingDEndpoint Security Assessment Plug-in
单选题You network contains an Exchange Server 2010 Mailbox server.You install and configure a third-party antivirus application on the server.You discover that a mailbox database named DB1 does not mount.You attempt to mount the mailbox database and receive an error message starting that the file named E01.log cannot be found.You need to mount DB1.The solution must prevent the antivirus application from causing the same error. What should you do?()ADisable the antivirus application.Restore E01.log from the most recent backup.Run the mount-database DB1 commandBDisable the antivirus application.Restore DB1 from the most recent backup.Run the mount-database DB1 commandCExclude the transaction log folder from the antivirus application scans.Restore E01.log from the antivirus quarentine.Run the mount-database DB1 commandDExclude the transaction log folder from the antivirus application scans.Restore DB1 from the most recent backup.Run the mount-database DB1 command
单选题Which of the following statements best describes a Pre-sales Solution Assurance Review?()AAn account team proposal reviewBAn installation planning meetingCA solution design development methodologyDA technical inspection of a completed solution design