更多“Which software-based security th”相关问题
  • 第1题:

    At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)

    A. [edit security idp]

    B. [edit security zones security-zone trust interfaces ge-0/0/0.0]

    C. [edit security zones security-zone trust]

    D. [edit security screen]


    参考答案:B, C

  • 第2题:

    Which software-based security threat is typically spread from user to user via e-mail?()

    A.Data interception

    B.Virus

    C.Trojan horse

    D.Denial of service


    参考答案:B

  • 第3题:

    During which phase of the Steps to Success methodology for Cisco SMB Security Solutions would the Security Technology Requirements document be used to determine a customer’s security requirements?()

    • A、Perform
    • B、Position
    • C、Develop
    • D、Prepare
    • E、Plan
    • F、Design

    正确答案:E

  • 第4题:

    Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()

    • A、Honeynet
    • B、Honeypot
    • C、Vulnerability scanner
    • D、Network based IDS

    正确答案:A

  • 第5题:

    Which menu option must be used to grant a user the authority to add or remove users to one or more Security Groups?()

    • A、 Security Controls
    • B、 Database Access
    • C、 Set Security Profile
    • D、 Authorize Group Reassignment

    正确答案:D

  • 第6题:

    Which of the following options should be used to obtain the latest security patches for AIX?()

    • A、FixDist
    • B、The Bonus Pack CD
    • C、OPS
    • D、The Security Maintenance CD

    正确答案:D

  • 第7题:

    At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)

    • A、[edit security idp]
    • B、[edit security zones security-zone trust interfaces ge-0/0/0.0]
    • C、[edit security zones security-zone trust]
    • D、[edit security screen]

    正确答案:B,C

  • 第8题:

    单选题
    Which menu option must be used to grant a user the authority to add or remove users to one or more Security Groups?()
    A

     Security Controls

    B

     Database Access

    C

     Set Security Profile

    D

     Authorize Group Reassignment


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()
    A

    /etc/security/limits

    B

    /etc/security/mkuser.sys

    C

    /etc/security/priv

    D

    /etc/security/user


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    Which software-based security threat is typically spread from user to user via e-mail?()
    A

    Data interception

    B

    Virus

    C

    Trojan horse

    D

    Denial of service


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    Which operational mode command displays all active IPsec phase 2 security associations?()
    A

    show ike security-associations

    B

    show ipsec security-associations

    C

    show security ike security-associations

    D

    show security ipsec security-associations


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()
    A

     Cisco SDM Security Audit

    B

     Cisco Security MARS

    C

     Cisco Security Agent MC

    D

     Cisco Security IntelliShield

    E

     CAN


    正确答案: E
    解析: 暂无解析

  • 第13题:

    Which statement describes a security zone?()

    A. A security zone can contain one or more interfaces.

    B. A security zone can contain interfaces in multiple routing instances.

    C. A security zone must contain two or more interfaces.

    D. A security zone must contain bridge groups.


    参考答案:A

  • 第14题:

    Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()

    • A、 Cisco SDM Security Audit
    • B、 Cisco Security MARS
    • C、 Cisco Security Agent MC
    • D、 Cisco Security IntelliShield
    • E、 CAN

    正确答案:A

  • 第15题:

    Which of the following are examples of physical security measures?()

    • A、Policies and procedures
    • B、Encryption
    • C、Locked doors
    • D、Security personnel
    • E、Backup tapes

    正确答案:C,D

  • 第16题:

    A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()

    • A、fwtmp < /etc/security/failedlogin
    • B、cat /etc/security/failedlogin
    • C、who
    • D、alog -f /etc/security/failedlogin -o

    正确答案:A

  • 第17题:

    Which file contains the attributes used to setup a new user account when executing ‘mkuser’ without any flags?()

    • A、/etc/security/user
    • B、/etc/security/passwd
    • C、/etc/security/mkuser.sys
    • D、/etc/security/mkuser.default

    正确答案:D

  • 第18题:

    A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()

    • A、/etc/security/limits
    • B、/etc/security/mkuser.sys
    • C、/etc/security/priv
    • D、/etc/security/user

    正确答案:D

  • 第19题:

    You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()

    • A、Microsoft Baseline Security Analyzer (MBSA)
    • B、Microsoft Security Assessment Tool (MSAT)
    • C、Resultant Set of Policy (RSoP)
    • D、Security Configuration Wizard (SCW)

    正确答案:A

  • 第20题:

    单选题
    A network vulnerability scanner is part of which critical element of network and system security?()
    A

     host security

    B

     perimeter security

    C

     security monitoring

    D

     policy management


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Which statement accurately describes firewall user authentication?()
    A

    Firewall user authentication provides another layer of security in a network.

    B

    Firewall user authentication provides a means for accessing a JUNOS Software-based security device.

    C

    Firewall user authentication enables session-based forwarding.

    D

    Firewall user authentication is used as a last resort security method in a network.


    正确答案: A
    解析: 暂无解析

  • 第22题:

    多选题
    At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)
    A

    [edit security idp]

    B

    [edit security zones security-zone trust interfaces ge-0/0/0.0]

    C

    [edit security zones security-zone trust]

    D

    [edit security screen]


    正确答案: B,D
    解析: 暂无解析

  • 第23题:

    多选题
    Which two commands can be used to monitor firewall user authentication?()
    A

    show access firewall-authentication

    B

    show security firewall-authentication users

    C

    show security audit log

    D

    show security firewall-authentication history


    正确答案: A,C
    解析: 暂无解析

  • 第24题:

    单选题
    Which CLI command provides a summary of what the content-filtering engine has blocked?()
    A

    show security utm content-filtering statistics

    B

    show security flow session

    C

    show security flow statistics

    D

    show security utm content-filtering summary


    正确答案: C
    解析: 暂无解析