多选题What are two steps that must be taken when mitigating a worm attack?()AInoculate systems by applying update patches.BLimit traffic rate.CApply authentication.DQuarantine infected machines.EEnable anti-spoof measures.

多选题
What are two steps that must be taken when mitigating a worm attack?()
A

Inoculate systems by applying update patches.

B

Limit traffic rate.

C

Apply authentication.

D

Quarantine infected machines.

E

Enable anti-spoof measures.


参考解析

解析: 暂无解析

相关考题:

(b) Assuming that the acquisition proceeds, what steps will Datum Paper Products need to take to build a sharedculture in the two companies? (10 marks)

Every so often, ________ your situation and consider what steps have to be taken next.A take inventory ofB take account ofC take charge ofD take stock of

What must be paid attention when watchkeeping in the engine room?

What procedures should be taken when you receive helm orders as a helmsman?

Which step should be taken,if possible,when the vessel must be abandoned because of a distress situation ________.A.Alert the Coast Guard by using the survival craft's portable INMARSAT unitB.Program the SART and EPIRB to transmit the vessel's location and situationC.Place the SART and EPIRB in the“ON”position and secure them to the survival craftD.No additional steps are needed as the SART and EPIRB will both automatically float free and operate properly

When the derrick is stopped, the guy must be().A、take inB、slacked offC、stowedD、taken

What are the four steps, in their correct order, to mitigate a worm attack?()A、contain,inoculate,quarantine,and treatB、inoculate,contain,quarantine,and treatC、quarantine,contain,inoculate,and treatD、preparation,identification,traceback,and postmortemE、preparation,classification,reaction,and treatF、identification,inoculation,postmortem,and reaction

What are two steps that must be taken when mitigating a worm attack?()A、Inoculate systems by applying update patches. B、Limit traffic rate. C、Apply authentication. D、Quarantine infected machines. E、Enable anti-spoof measures.

When the derrick is stopped, the guy must be ()(收好).A、taken inB、slacked offC、adjustedD、stowed

When the derrick is topped, the guys must be ().A、slacked offB、send awayC、taken inD、send out

On an existing two-node cluster, the system is configured with RAID5 SSA as the shared disk.  When adding a new node to the cluster, what must be taken into consideration?()  A、 Nothing,SSA can support a maximum of 8 initiators per loop.B、 The RAID5 implementation on SSA will only support two initiators per loop.C、 SSA can only support four initiators per lop when using the fat write option.D、 The RAID implementation can be used with three initiators only if the fast write cache option is used on all adapters.

What is an important consideration that should be taken into account when configuring shaped round robin?()A、It enables policing.B、Strict priority is not supported.C、WRED must be previously enabled.D、It enables WRR

You want to enhance the security within the LAN and prevent VLAN hopping.  What two steps can be taken to help prevent this?()A、Enable BPD guardB、Disable CDP on ports where it is not necessaryC、Place unused ports in a common unrouted VLAND、Prevent automatic trunk configurationE、Implement port security

What are two steps that are taken when a router converts a voice signal from analog to digital form?()A、samplingB、packetizationC、quantizationD、serialization

多选题What are two methods of mitigating MAC address flooding attacks?()APlace unused ports in a common VLAN.BImplement private VLANs.CImplement DHCP snooping.DImplement port security.EImplement VLAN access maps.

单选题What is an important consideration that should be taken into account when configuring shaped round robin?()AIt enables policing.BStrict priority is not supported.CWRED must be previously enabled.DIt enables WRR

多选题What are two requirements when using AppFlow?() (Choose two.)AQuality of service must be enabled.BNSC compression must be enabled.CPFA's TCP Acceleration (AFP) must be enabled.DAppFlow must be configured on the client-side device first.

多选题What are two requirements when using AppFlow? ()(Choose two.)AQuality of service must be enabled.BNSC compression must be enabled.CPFA's TCP Acceleration (AFP) must be enabled.DAppFlow must be configured on the client-side device first

单选题On an existing two-node cluster, the system is configured with RAID5 SSA as the shared disk.  When adding a new node to the cluster, what must be taken into consideration?()A Nothing,SSA can support a maximum of 8 initiators per loop.B The RAID5 implementation on SSA will only support two initiators per loop.C SSA can only support four initiators per lop when using the fat write option.D The RAID implementation can be used with three initiators only if the fast write cache option is used on all adapters.

单选题What are the four steps, in their correct order, to mitigate a worm attack?()Acontain,inoculate,quarantine,and treatBinoculate,contain,quarantine,and treatCquarantine,contain,inoculate,and treatDpreparation,identification,traceback,and postmortemEpreparation,classification,reaction,and treatFidentification,inoculation,postmortem,and reaction

单选题What are two steps that are taken when a router converts a voice signal from analog to digital form?()A samplingB packetizationC quantizationD serialization

单选题What action must be taken when an individual cargo tank is closed off from the inert gas system by the tank isolation valve?()AThe tank must be gas freedBThe tank must be ballastedCThe tank must be vented to the atmosphereDThe bypass valve must also be closed

多选题You want to enhance the security within the LAN and prevent VLAN hopping.  What two steps can be taken to help prevent this?()AEnable BPD guardBDisable CDP on ports where it is not necessaryCPlace unused ports in a common unrouted VLANDPrevent automatic trunk configurationEImplement port security

多选题What are two steps that must be taken when mitigating a worm attack?()AInoculate systems by applying update patches.BLimit traffic rate.CApply authentication.DQuarantine infected machines.EEnable anti-spoof measures.

多选题What two steps need to be taken in deploying AutoQoS for enterprise on routers?()Aprovide visibility into the classes of service deployed using system logging and SNMP trapsBdetermine WAN settings for fragmentation, compression, encapsulation, and Frame Relay-ATM interworkingCenable the AutoQoS VoIP for voice trafficDgenerate and deploy MQC-based QoS policiesEprofile the traffic with Auto-Discovery

多选题What are two requirements when using Packet Flow Acceleration? ()(Choose two.)ATraffic needs be compressed.BQuality of service must be enabled.CA service tunnel must exist in at least one direction.DPFA must be enabled on the client-side WX device.

问答题Discuss, and decide together:  ● What kinds of reasons might there be for staff leaving their jobs?  ● What steps could be taken to reduce staff turnover?

单选题Which step should be taken,if possible,when the vessel must be abandoned because of a distress situation().AAlert the Coast Guard by using the survival craft's portable INMARSAT unitBProgram the SART and EPIRB to transmit the vessel's location and situationCPlace the SART and EPIRB in the“ON”position and secure them to the survival craftDNo additional steps are needed as the SART and EPIRB will both automatically float free and operate properly