Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A、IDSB、VPNC、NIPSD、HIDS

Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()

  • A、IDS
  • B、VPN
  • C、NIPS
  • D、HIDS

相关考题:

Which of the following is BEST for providing network security?() A.FirewallB.DMZC.SwitchD.IDS

Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?() A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS

Cisco Clean Access ensures that computers connecting to your network have which of the following?()A、 No vulnerable applications or operating systemsB、 No viruses or wormsC、 Appropriate security applications and patch levelsD、 Current IPS signaturesE、 Cisco Security Agent

For the following attempts, which one is to ensure that no one employee becomes a pervasive securitythreat, that data can be recovered from backups, and that information system changes do not compromisea system’s security?()A、Strategic security planningB、Disaster recoveryC、Implementation securityD、Operations security

Which of the following is BEST for providing network security?()A、FirewallB、DMZC、SwitchD、IDS

Which of the following security threats involves making phone calls?()A、PhishingB、VishingC、DDoSD、Xmas attack

Which of the following provides the BEST security and accountability for a Data Center?()A、Entry loggingB、Combination locksC、Card keysD、Dead bolts

Which of the following would be an example of a biometric device?()A、USB security keyB、smart card readerC、thumb print readerD、encryption password

Which of the following does not affect security on a wireless access point?()A、EncryptionB、DHCPC、PasswordD、SSID

A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()A、WEPB、Port filteringC、WPAD、Longer SSID broadcast intervals

Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()A、Intrusion detectionB、VirtualizationC、KitingD、Cloning

Which of the following are examples of physical security measures?()A、Policies and proceduresB、EncryptionC、Locked doorsD、Security personnelE、Backup tapes

Which of the following security threats are MOST likely prevented through user training?()A、Network IntrusionB、Adware PopupsC、Social EngineeringD、Spam Messages

Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS

A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()A、fwtmp  /etc/security/failedloginB、cat /etc/security/failedloginC、whoD、alog -f /etc/security/failedlogin -o

Which of the following options should be used to obtain the latest security patches for AIX?()A、FixDistB、The Bonus Pack CDC、OPSD、The Security Maintenance CD

A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user

Which of the following tools are used to apply a Security Template in Windows Server 2012 R2?()A、Integration ServicesB、Security Configuration and AnalysisC、Resultant Set of PolicyD、TS ManagerE、Resource meteringF、Active Directory Domains and Trusts

单选题When installing a security system, which of the following connectors would be used to connect the security system to the telephone service demarcation?()ARJ-31xBRJ-11CRS-232DDB-9

单选题A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A/etc/security/limitsB/etc/security/mkuser.sysC/etc/security/privD/etc/security/user

多选题Which of the following are examples of physical security measures?()APolicies and proceduresBEncryptionCLocked doorsDSecurity personnelEBackup tapes