Which software-based security threat is typically spread from user to user via e-mail?()
第1题:
A. [edit security idp]
B. [edit security zones security-zone trust interfaces ge-0/0/0.0]
C. [edit security zones security-zone trust]
D. [edit security screen]
第2题:
A.Data interception
B.Virus
C.Trojan horse
D.Denial of service
第3题:
During which phase of the Steps to Success methodology for Cisco SMB Security Solutions would the Security Technology Requirements document be used to determine a customer’s security requirements?()
第4题:
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
第5题:
Which menu option must be used to grant a user the authority to add or remove users to one or more Security Groups?()
第6题:
Which of the following options should be used to obtain the latest security patches for AIX?()
第7题:
At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)
第8题:
Security Controls
Database Access
Set Security Profile
Authorize Group Reassignment
第9题:
/etc/security/limits
/etc/security/mkuser.sys
/etc/security/priv
/etc/security/user
第10题:
Data interception
Virus
Trojan horse
Denial of service
第11题:
show ike security-associations
show ipsec security-associations
show security ike security-associations
show security ipsec security-associations
第12题:
Cisco SDM Security Audit
Cisco Security MARS
Cisco Security Agent MC
Cisco Security IntelliShield
CAN
第13题:
A. A security zone can contain one or more interfaces.
B. A security zone can contain interfaces in multiple routing instances.
C. A security zone must contain two or more interfaces.
D. A security zone must contain bridge groups.
第14题:
Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()
第15题:
Which of the following are examples of physical security measures?()
第16题:
A System p administrator is investigating a possible security breech and wants to review information about failed login attempts to the system. Which of the following commands will show this()
第17题:
Which file contains the attributes used to setup a new user account when executing ‘mkuser’ without any flags?()
第18题:
A System p administrator needs to set the default password length for all users to six characters. Which of the following files needs to be edited to accomplish this ()
第19题:
You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()
第20题:
host security
perimeter security
security monitoring
policy management
第21题:
Firewall user authentication provides another layer of security in a network.
Firewall user authentication provides a means for accessing a JUNOS Software-based security device.
Firewall user authentication enables session-based forwarding.
Firewall user authentication is used as a last resort security method in a network.
第22题:
[edit security idp]
[edit security zones security-zone trust interfaces ge-0/0/0.0]
[edit security zones security-zone trust]
[edit security screen]
第23题:
show access firewall-authentication
show security firewall-authentication users
show security audit log
show security firewall-authentication history
第24题:
show security utm content-filtering statistics
show security flow session
show security flow statistics
show security utm content-filtering summary