单选题Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()AProtocol analyzerBVulnerability scannerCPort scannerDPenetration test

单选题
Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()
A

Protocol analyzer

B

Vulnerability scanner

C

Port scanner

D

Penetration test


参考解析

解析: 暂无解析

相关考题:

Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?() A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS

Which of the following is the LEAST intrusive?() A. Firmware updateB. Remote management cardC. Diagnostic LEDsD. Multimeter

Which of the following monitors a server to see which protocols might be in use?() A. Ping sweepB. Intrusion detection softwareC. Port scannerD. Wireless packet sniffer

Which of the following is the BEST way to allow web software through the server firewall?() A. Implement an application exception.B. Implement an access control list (ACL).C. Open the corporate firewall to allow port 80.D. Implement port blocking on port 80.

Examine the following options,which Spanning Tree Protocol (STP) protection mechanism disables aswitch port if the port receives a Bridge Protocol Data Unit (BPDU)?()A、Uplink FastB、Port FastC、BPDU GuardD、Root Guard

Which of the following allows a program or port through a software firewall?()A、ExceptionB、Pass-throughC、Port-forwardingD、Punch-through

Which of the following monitors a server to see which protocols might be in use?()A、Ping sweepB、Intrusion detection softwareC、Port scannerD、Wireless packet sniffer

Which of the following is the EASIEST way to centrally deploy software?()A、Network shareB、PXEC、USBD、Optical media

Which of the following is the BEST way to allow web software through the server firewall?()A、Implement an application exception.B、Implement an access control list (ACL).C、Open the corporate firewall to allow port 80.D、Implement port blocking on port 80.

Which of the following would an attacker use to footprint a system?()A、RADIUSB、Password crackerC、Port scannerD、Man-in-the-middle attack

An administrator is planning an upgrade of a major software package on an application server.The software has been tested successfully in a test environment and it is ready to go into production. Which of the following steps should the administrator take next?()A、Identify necessary operating system updatesB、Implement the changeC、Document the changeD、Schedule system down time

Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()A、Protocol analyzerB、Vulnerability scannerC、Port scannerD、Penetration test

Which of the following is the LEAST intrusive?()A、Firmware updateB、Remote management cardC、Diagnostic LEDsD、Multimeter

Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS

Your database is not configured for session failover. Your tnsnames.ora file contains the following details:  test.us.oracle.com= (DESCRIPTION=  (ADDRESS_LIST= (LOAD_BALANCE=off)   (FAILOVER=ON)   (ADDRESS= (PROTOCOL=tcp)(HOST=test1-server)(PORT=1521))   (ADDRESS= (PROTOCOL=tcp)(HOST=test2-server)(PORT=1521)))   (CONNECT_DATA= (SERVICE_NAME=test.us.oracle.com)))   Which feature is enabled in this case?()A、Load balancingB、Instance failoverC、Database failoverD、Connect-time failoverE、Transparent Application Failover (TAF)

单选题Which of the following is the BEST way to allow web software through the server firewall?()AImplement an application exception.BImplement an access control list (ACL).COpen the corporate firewall to allow port 80.DImplement port blocking on port 80.

单选题Which of the following should Karen, a technician, use to test a parallel port?()ALine testerBMultimeterCNull modem cableDLoopback plugs

单选题Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()AProtocol analyzerBVulnerability scannerCPort scannerDPenetration test

单选题Your database is not configured for session failover. Your tnsnames.ora file contains the following details:  test.us.oracle.com= (DESCRIPTION=  (ADDRESS_LIST= (LOAD_BALANCE=off)   (FAILOVER=ON)   (ADDRESS= (PROTOCOL=tcp)(HOST=test1-server)(PORT=1521))   (ADDRESS= (PROTOCOL=tcp)(HOST=test2-server)(PORT=1521)))   (CONNECT_DATA= (SERVICE_NAME=test.us.oracle.com)))   Which feature is enabled in this case?()ALoad balancingBInstance failoverCDatabase failoverDConnect-time failoverETransparent Application Failover (TAF)

单选题For the following ports, which port is on every bridge in a Spanning Tree Protocol IEEE 802.1w network except the root bridge?()Aroot portBbackup portCdesignated portDalternate port

单选题An administrator is planning an upgrade of a major software package on an application server.The software has been tested successfully in a test environment and it is ready to go into production. Which of the following steps should the administrator take next?()AIdentify necessary operating system updatesBImplement the changeCDocument the changeDSchedule system down time

单选题Which of the following is the EASIEST way to centrally deploy software?()A Network shareB PXEC USBD Optical media

单选题An administrator is planning an upgrade of a major software package on an application server. The software has been tested successfully in a test environment and it is ready to go into production.  Which of the following steps should the administrator take next?()A Identify necessary operating system updatesB Implement the changeC Document the changeD Schedule system down time

单选题Which of the following is the LEAST intrusive?()AFirmware updateBRemote management cardCDiagnostic LEDsDMultimeter

单选题An administrator is planning an upgrade of a major software package on an application server.The software has been identified, the project approved and the upgrade purchased. Which of the following steps should the administrator take NEXT?()ACreate a test environment for the new version.BDetermine system requirements for the upgrade.CRequest bids from other competing vendors in the product space.DDocument the upgrade.

单选题Which of the following is the EASIEST way to centrally deploy software?()ANetwork shareBPXECUSBDOptical media

单选题Which of the following allows a program or port through a software firewall?()AExceptionBPass-throughCPort-forwardingDPunch-through

单选题Examine the following options,which Spanning Tree Protocol (STP) protection mechanism disables aswitch port if the port receives a Bridge Protocol Data Unit (BPDU)?()AUplink FastBPort FastCBPDU GuardDRoot Guard