A.Performing end-user training on the use of antispyware software
B.Performing virus scans
C.Scanning a network for active IP addresses and open ports on those IP addresses
D.Using password-cracking utilities
您可能感興趣的試卷
你可能感興趣的試題
A.Top-secret
B.Confidential
C.SBU
D.Secret
A.Host-based IPS can work in promiscuous mode or inline mode.
B.Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.
C.Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows.
D.Host-based IPS deployment requires less planning than network-based IPS.
A.HMAC
B.RSA
C.MD5
D.SHA-1
A.MD65
B.SHA-135
C.XR12
D.MD5
A.Ciphertext
B.Salt
C.Cryptotext
D.Rainbow table
最新試題
Which key method is used to detect and prevent attacks by use of IDS and/or IPS technologies?()
On the basis of the show policy-map type inspect zone-pair session command output provided in theexhibit.What can be determined about this Cisco IOS zone based firewall policy?()
How do you define the authentication method that will be used with AAA?()
What is a static packet-filtering firewall used for ?()
Which type of MAC address is dynamically learned by a switch port and then added to the switch’s runningconfiguration?()
In an IEEE 802.1x deployment,between which two devices EAPOL messages typically are sent?()
What is the objective of Diffie-Hellman?()
Which option ensures that data is not modified in transit?()
Please choose the correct description about Cisco Self-Defending Network characteristics.()
Which one of the Cisco IOS commands can be used to verify that either the Cisco IOS image, theconfiguration files,or both have been properly backed up and secured?()