单选题Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()AProtocol analyzerBVulnerability scannerCPort scannerDPenetration test
单选题
Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()
A
Protocol analyzer
B
Vulnerability scanner
C
Port scanner
D
Penetration test
参考解析
解析:
暂无解析
相关考题:
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?() A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS
Which of the following is the LEAST intrusive?() A. Firmware updateB. Remote management cardC. Diagnostic LEDsD. Multimeter
Which of the following monitors a server to see which protocols might be in use?() A. Ping sweepB. Intrusion detection softwareC. Port scannerD. Wireless packet sniffer
Which of the following is the BEST way to allow web software through the server firewall?() A. Implement an application exception.B. Implement an access control list (ACL).C. Open the corporate firewall to allow port 80.D. Implement port blocking on port 80.
Examine the following options,which Spanning Tree Protocol (STP) protection mechanism disables aswitch port if the port receives a Bridge Protocol Data Unit (BPDU)?()A、Uplink FastB、Port FastC、BPDU GuardD、Root Guard
Which of the following allows a program or port through a software firewall?()A、ExceptionB、Pass-throughC、Port-forwardingD、Punch-through
Which of the following monitors a server to see which protocols might be in use?()A、Ping sweepB、Intrusion detection softwareC、Port scannerD、Wireless packet sniffer
Which of the following is the EASIEST way to centrally deploy software?()A、Network shareB、PXEC、USBD、Optical media
Which of the following is the BEST way to allow web software through the server firewall?()A、Implement an application exception.B、Implement an access control list (ACL).C、Open the corporate firewall to allow port 80.D、Implement port blocking on port 80.
Which of the following would an attacker use to footprint a system?()A、RADIUSB、Password crackerC、Port scannerD、Man-in-the-middle attack
An administrator is planning an upgrade of a major software package on an application server.The software has been tested successfully in a test environment and it is ready to go into production. Which of the following steps should the administrator take next?()A、Identify necessary operating system updatesB、Implement the changeC、Document the changeD、Schedule system down time
Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()A、Protocol analyzerB、Vulnerability scannerC、Port scannerD、Penetration test
Which of the following is the LEAST intrusive?()A、Firmware updateB、Remote management cardC、Diagnostic LEDsD、Multimeter
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS
Your database is not configured for session failover. Your tnsnames.ora file contains the following details: test.us.oracle.com= (DESCRIPTION= (ADDRESS_LIST= (LOAD_BALANCE=off) (FAILOVER=ON) (ADDRESS= (PROTOCOL=tcp)(HOST=test1-server)(PORT=1521)) (ADDRESS= (PROTOCOL=tcp)(HOST=test2-server)(PORT=1521))) (CONNECT_DATA= (SERVICE_NAME=test.us.oracle.com))) Which feature is enabled in this case?()A、Load balancingB、Instance failoverC、Database failoverD、Connect-time failoverE、Transparent Application Failover (TAF)
单选题Which of the following is the BEST way to allow web software through the server firewall?()AImplement an application exception.BImplement an access control list (ACL).COpen the corporate firewall to allow port 80.DImplement port blocking on port 80.
单选题Which of the following should Karen, a technician, use to test a parallel port?()ALine testerBMultimeterCNull modem cableDLoopback plugs
单选题Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()AProtocol analyzerBVulnerability scannerCPort scannerDPenetration test
单选题Your database is not configured for session failover. Your tnsnames.ora file contains the following details: test.us.oracle.com= (DESCRIPTION= (ADDRESS_LIST= (LOAD_BALANCE=off) (FAILOVER=ON) (ADDRESS= (PROTOCOL=tcp)(HOST=test1-server)(PORT=1521)) (ADDRESS= (PROTOCOL=tcp)(HOST=test2-server)(PORT=1521))) (CONNECT_DATA= (SERVICE_NAME=test.us.oracle.com))) Which feature is enabled in this case?()ALoad balancingBInstance failoverCDatabase failoverDConnect-time failoverETransparent Application Failover (TAF)
单选题For the following ports, which port is on every bridge in a Spanning Tree Protocol IEEE 802.1w network except the root bridge?()Aroot portBbackup portCdesignated portDalternate port
单选题An administrator is planning an upgrade of a major software package on an application server.The software has been tested successfully in a test environment and it is ready to go into production. Which of the following steps should the administrator take next?()AIdentify necessary operating system updatesBImplement the changeCDocument the changeDSchedule system down time
单选题Which of the following is the EASIEST way to centrally deploy software?()A Network shareB PXEC USBD Optical media
单选题An administrator is planning an upgrade of a major software package on an application server. The software has been tested successfully in a test environment and it is ready to go into production. Which of the following steps should the administrator take next?()A Identify necessary operating system updatesB Implement the changeC Document the changeD Schedule system down time
单选题Which of the following is the LEAST intrusive?()AFirmware updateBRemote management cardCDiagnostic LEDsDMultimeter
单选题An administrator is planning an upgrade of a major software package on an application server.The software has been identified, the project approved and the upgrade purchased. Which of the following steps should the administrator take NEXT?()ACreate a test environment for the new version.BDetermine system requirements for the upgrade.CRequest bids from other competing vendors in the product space.DDocument the upgrade.
单选题Which of the following is the EASIEST way to centrally deploy software?()ANetwork shareBPXECUSBDOptical media
单选题Which of the following allows a program or port through a software firewall?()AExceptionBPass-throughCPort-forwardingDPunch-through
单选题Examine the following options,which Spanning Tree Protocol (STP) protection mechanism disables aswitch port if the port receives a Bridge Protocol Data Unit (BPDU)?()AUplink FastBPort FastCBPDU GuardDRoot Guard