Which software-based security threat is typically spread from user to user via e-mail?()A、Data interceptionB、VirusC、Trojan horseD、Denial of service

Which software-based security threat is typically spread from user to user via e-mail?()

  • A、Data interception
  • B、Virus
  • C、Trojan horse
  • D、Denial of service

相关考题:

One solution to major security problems is ______, which are frequently installed to fix known security holes.A.patchesB.compensationsC.complementsD.additions

there was a general flowering of culture and intellectual life in europe during the 1 7th and 18th centuries which is known as “the renaissance.” ()

on which day is halloween celebrated?A. Match 17th.B. December 25th.C. October 31stD. November 5th

_______means the level for which appropriate additional protective security measures shall be maintained for a period of time as a result of heightened risk of a security incident.A.Security level 1B.Security level 2C.Security level 3D.Security level 4

At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.) A. [edit security idp]B. [edit security zones security-zone trust interfaces ge-0/0/0.0]C. [edit security zones security-zone trust]D. [edit security screen]

Which statement describes a security zone?() A. A security zone can contain one or more interfaces.B. A security zone can contain interfaces in multiple routing instances.C. A security zone must contain two or more interfaces.D. A security zone must contain bridge groups.

Which software-based security threat is typically spread from user to user via e-mail?() A.Data interceptionB.VirusC.Trojan horseD.Denial of service

Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()A、 Cisco SDM Security AuditB、 Cisco Security MARSC、 Cisco Security Agent MCD、 Cisco Security IntelliShieldE、 CAN

During which phase of the Steps to Success methodology for Cisco SMB Security Solutions would the Security Technology Requirements document be used to determine a customer’s security requirements?()A、PerformB、PositionC、DevelopD、PrepareE、PlanF、Design

Which of the following are examples of physical security measures?()A、Policies and proceduresB、EncryptionC、Locked doorsD、Security personnelE、Backup tapes

Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS

A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()A、fwtmp  /etc/security/failedloginB、cat /etc/security/failedloginC、whoD、alog -f /etc/security/failedlogin -o

Which menu option must be used to grant a user the authority to add or remove users to one or more Security Groups?()A、 Security ControlsB、 Database AccessC、 Set Security ProfileD、 Authorize Group Reassignment

Which file contains the attributes used to setup a new user account when executing ‘mkuser’ without any flags?()A、/etc/security/userB、/etc/security/passwdC、/etc/security/mkuser.sysD、/etc/security/mkuser.default

Which of the following options should be used to obtain the latest security patches for AIX?()A、FixDistB、The Bonus Pack CDC、OPSD、The Security Maintenance CD

A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user

At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)A、[edit security idp]B、[edit security zones security-zone trust interfaces ge-0/0/0.0]C、[edit security zones security-zone trust]D、[edit security screen]

You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()A、Microsoft Baseline Security Analyzer (MBSA)B、Microsoft Security Assessment Tool (MSAT)C、Resultant Set of Policy (RSoP)D、Security Configuration Wizard (SCW)

单选题Which menu option must be used to grant a user the authority to add or remove users to one or more Security Groups?()A Security ControlsB Database AccessC Set Security ProfileD Authorize Group Reassignment

单选题A network vulnerability scanner is part of which critical element of network and system security?()A host securityB perimeter securityC security monitoringD policy management

单选题A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A/etc/security/limitsB/etc/security/mkuser.sysC/etc/security/privD/etc/security/user

单选题Which statement accurately describes firewall user authentication?()AFirewall user authentication provides another layer of security in a network.BFirewall user authentication provides a means for accessing a JUNOS Software-based security device.CFirewall user authentication enables session-based forwarding.DFirewall user authentication is used as a last resort security method in a network.

单选题Which software-based security threat is typically spread from user to user via e-mail?()AData interceptionBVirusCTrojan horseDDenial of service

多选题At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)A[edit security idp]B[edit security zones security-zone trust interfaces ge-0/0/0.0]C[edit security zones security-zone trust]D[edit security screen]

单选题Which operational mode command displays all active IPsec phase 2 security associations?()Ashow ike security-associationsBshow ipsec security-associationsCshow security ike security-associationsDshow security ipsec security-associations

多选题Which two commands can be used to monitor firewall user authentication?()Ashow access firewall-authenticationBshow security firewall-authentication usersCshow security audit logDshow security firewall-authentication history

单选题Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()A Cisco SDM Security AuditB Cisco Security MARSC Cisco Security Agent MCD Cisco Security IntelliShieldE CAN

单选题Which CLI command provides a summary of what the content-filtering engine has blocked?()Ashow security utm content-filtering statisticsBshow security flow sessionCshow security flow statisticsDshow security utm content-filtering summary