Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?() A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
A. Honeynet
B. Honeypot
C. Vulnerability scanner
D. Network based IDS
相关考题:
Asystemadministratorwantstoconfigureasystemsothatallnewuserswillbeputintothedatabasegroupbydefault.Howwouldthisbeaccomplished?() A.removeallothergroupsfromthesystemB.runthecommandmkuser-defaultGROUP=databaseC.changethedefaultgroupin/usr/lib/security/mkuser.defaultD.edit/etc/security/grouptomovealluserstothedatabasestanza
Asystemadministratorwasaskedtologinformationonpossiblesecuritybreachesonaserver.Whichfileshouldadditionalentriesbeaddedtocapturethisinformation?() A./var/adm/sulogB./etc/syslog.confC./etc/security/sysck.cfgD./etc/security/login.cfg
ASystempadministratorneedstosetthedefaultpasswordlengthforalluserstosixcharacters.Whichofthefollowingfilesneedstobeeditedtoaccomplishthis() A./etc/security/limitsB./etc/security/mkuser.sysC./etc/security/privD./etc/security/user
Therootidissetsothatdirectloginisdisabled.Informationmustbereviewedrelatingtowhenrootaccesswasobtained.Inwhichofthefollowingfilesisthisinformationlocated?() A./var/adm/sulogB./var/adm/wtmpC./etc/security/userD./etc/security/failedlogin
ASystempadministratorisinvestigatingapossiblesecuritybreechandwantstoreviewinformationaboutfailedloginattemptstothesystem.Whichofthefollowingcommandswillshowthis() A.fwtmp/etc/security/failedloginB.cat/etc/security/failedloginC.whoD.alog-f/etc/security/failedlogin-o
Anadministratorwasaskedtologinformationonpossiblesecuritybreachesonaserver.Towhichfileshouldadditionalentriesbeaddedtocapturethisinformation() A./var/adm/sulogB./etc/syslog.confC./etc/security/sysck.cfgD./etc/security/syslog.conf
下面有关WS-Security标准的描述哪些是正确的?() A.WS-Security加强了Web服务的消息完整性B.WS-Security加强了Web服务的消息机密性C.WS-Security可取代现有的数字签名技术D.WS-Security本身提供了加密算法
WhatbestdescribesthefeaturesoftheCisco850Seriesrouters?() A.integratesdata,security,andwirelessB.integratesdata,ecurity,wirelessandapplicationoptimizationC.integratesvoice,data,security,wirelessandapplicationoptimizationD.integratesdataandwireless
According to Para.7,which of the following is not the way that passage suggests to improve cyber-security?( ) A.Be quick to predict and respond when there is insecurity. B.Make sure everyone is equipped with fundamental knowledge of cyber-security. C.Be cooperative with counterparts on cyber-security. D.Be cautious using Internet.