多选题What are two steps that must be taken when mitigating a worm attack?()AInoculate systems by applying update patches.BLimit traffic rate.CApply authentication.DQuarantine infected machines.EEnable anti-spoof measures.
多选题
What are two steps that must be taken when mitigating a worm attack?()
A
Inoculate systems by applying update patches.
B
Limit traffic rate.
C
Apply authentication.
D
Quarantine infected machines.
E
Enable anti-spoof measures.
参考解析
解析:
暂无解析
相关考题:
(b) Assuming that the acquisition proceeds, what steps will Datum Paper Products need to take to build a sharedculture in the two companies? (10 marks)
Every so often, ________ your situation and consider what steps have to be taken next.A take inventory ofB take account ofC take charge ofD take stock of
Which step should be taken,if possible,when the vessel must be abandoned because of a distress situation ________.A.Alert the Coast Guard by using the survival craft's portable INMARSAT unitB.Program the SART and EPIRB to transmit the vessel's location and situationC.Place the SART and EPIRB in the“ON”position and secure them to the survival craftD.No additional steps are needed as the SART and EPIRB will both automatically float free and operate properly
What are the four steps, in their correct order, to mitigate a worm attack?()A、contain,inoculate,quarantine,and treatB、inoculate,contain,quarantine,and treatC、quarantine,contain,inoculate,and treatD、preparation,identification,traceback,and postmortemE、preparation,classification,reaction,and treatF、identification,inoculation,postmortem,and reaction
What are two steps that must be taken when mitigating a worm attack?()A、Inoculate systems by applying update patches. B、Limit traffic rate. C、Apply authentication. D、Quarantine infected machines. E、Enable anti-spoof measures.
On an existing two-node cluster, the system is configured with RAID5 SSA as the shared disk. When adding a new node to the cluster, what must be taken into consideration?() A、 Nothing,SSA can support a maximum of 8 initiators per loop.B、 The RAID5 implementation on SSA will only support two initiators per loop.C、 SSA can only support four initiators per lop when using the fat write option.D、 The RAID implementation can be used with three initiators only if the fast write cache option is used on all adapters.
What is an important consideration that should be taken into account when configuring shaped round robin?()A、It enables policing.B、Strict priority is not supported.C、WRED must be previously enabled.D、It enables WRR
You want to enhance the security within the LAN and prevent VLAN hopping. What two steps can be taken to help prevent this?()A、Enable BPD guardB、Disable CDP on ports where it is not necessaryC、Place unused ports in a common unrouted VLAND、Prevent automatic trunk configurationE、Implement port security
What are two steps that are taken when a router converts a voice signal from analog to digital form?()A、samplingB、packetizationC、quantizationD、serialization
多选题What are two methods of mitigating MAC address flooding attacks?()APlace unused ports in a common VLAN.BImplement private VLANs.CImplement DHCP snooping.DImplement port security.EImplement VLAN access maps.
单选题What is an important consideration that should be taken into account when configuring shaped round robin?()AIt enables policing.BStrict priority is not supported.CWRED must be previously enabled.DIt enables WRR
多选题What are two requirements when using AppFlow?() (Choose two.)AQuality of service must be enabled.BNSC compression must be enabled.CPFA's TCP Acceleration (AFP) must be enabled.DAppFlow must be configured on the client-side device first.
多选题What are two requirements when using AppFlow? ()(Choose two.)AQuality of service must be enabled.BNSC compression must be enabled.CPFA's TCP Acceleration (AFP) must be enabled.DAppFlow must be configured on the client-side device first
单选题On an existing two-node cluster, the system is configured with RAID5 SSA as the shared disk. When adding a new node to the cluster, what must be taken into consideration?()A Nothing,SSA can support a maximum of 8 initiators per loop.B The RAID5 implementation on SSA will only support two initiators per loop.C SSA can only support four initiators per lop when using the fat write option.D The RAID implementation can be used with three initiators only if the fast write cache option is used on all adapters.
单选题What are the four steps, in their correct order, to mitigate a worm attack?()Acontain,inoculate,quarantine,and treatBinoculate,contain,quarantine,and treatCquarantine,contain,inoculate,and treatDpreparation,identification,traceback,and postmortemEpreparation,classification,reaction,and treatFidentification,inoculation,postmortem,and reaction
单选题What are two steps that are taken when a router converts a voice signal from analog to digital form?()A samplingB packetizationC quantizationD serialization
单选题What action must be taken when an individual cargo tank is closed off from the inert gas system by the tank isolation valve?()AThe tank must be gas freedBThe tank must be ballastedCThe tank must be vented to the atmosphereDThe bypass valve must also be closed
多选题You want to enhance the security within the LAN and prevent VLAN hopping. What two steps can be taken to help prevent this?()AEnable BPD guardBDisable CDP on ports where it is not necessaryCPlace unused ports in a common unrouted VLANDPrevent automatic trunk configurationEImplement port security
多选题What are two steps that must be taken when mitigating a worm attack?()AInoculate systems by applying update patches.BLimit traffic rate.CApply authentication.DQuarantine infected machines.EEnable anti-spoof measures.
多选题What two steps need to be taken in deploying AutoQoS for enterprise on routers?()Aprovide visibility into the classes of service deployed using system logging and SNMP trapsBdetermine WAN settings for fragmentation, compression, encapsulation, and Frame Relay-ATM interworkingCenable the AutoQoS VoIP for voice trafficDgenerate and deploy MQC-based QoS policiesEprofile the traffic with Auto-Discovery
多选题What are two requirements when using Packet Flow Acceleration? ()(Choose two.)ATraffic needs be compressed.BQuality of service must be enabled.CA service tunnel must exist in at least one direction.DPFA must be enabled on the client-side WX device.
问答题Discuss, and decide together: ● What kinds of reasons might there be for staff leaving their jobs? ● What steps could be taken to reduce staff turnover?
单选题Which step should be taken,if possible,when the vessel must be abandoned because of a distress situation().AAlert the Coast Guard by using the survival craft's portable INMARSAT unitBProgram the SART and EPIRB to transmit the vessel's location and situationCPlace the SART and EPIRB in the“ON”position and secure them to the survival craftDNo additional steps are needed as the SART and EPIRB will both automatically float free and operate properly