Which key method is used to detect and prevent attacks by use of IDS and/or IPS technologies?()A、Signature-based detectionB、Anomaly-based detectionC、Honey pot detectionD、Policy-based detection

题目

Which key method is used to detect and prevent attacks by use of IDS and/or IPS technologies?()

  • A、Signature-based detection
  • B、Anomaly-based detection
  • C、Honey pot detection
  • D、Policy-based detection

相似考题
更多“Which key methodQ”相关问题
  • 第1题:

    Which of the following is a key component of a directory services server?()

    • A、 VPN
    • B、 RIS
    • C、 LDAP
    • D、 RAS

    正确答案:C

  • 第2题:

    Which statement describes the UTM licensing model?()

    • A、Install the license key and all UTM features will be enabled for the life of the product
    • B、Install one license key per feature and the license key will be enabled for the life of the product.
    • C、Install one UTM license key, which will activate all UTM features; the license will need to be renewed when it expires.
    • D、Install one UTM license key per UTM feature; the licenses will need to be renewed when they expire.

    正确答案:D

  • 第3题:

    Which two statements are true about the primary key constraint in a table? ()

    • A、It is not possible to disable the primary key constraint.
    • B、It is possible to have more than one primary key constraint in a single table.
    • C、The primary key constraint can be referred by only one foreign key constraint.
    • D、The primary key constraint can be imposed by combining more than one column.
    • E、The non-deferrable primary key constraint creates an unique index on the primary key column if it is not already indexed.

    正确答案:D,E

  • 第4题:

    多选题
    Which three are distinctions between asymmetric and symmetric algorithms? ()
    A

    Only symmetric algorithms have a key exchange technology built in

    B

    Asymmetric algorithms are used quite often as key exchange protocols for symmetricalgorithms

    C

    Only asymmetric algorithms have a key exchange technology built in

    D

    Asymmetric algorithms are based on more complex mathematical computations


    正确答案: C,A
    解析: 暂无解析

  • 第5题:

    单选题
    Which encryption type is used to secure user data in an IPsec tunnel?()
    A

    symmetric key encryption

    B

    asymmetric key encryption

    C

    RSA

    D

    digital certificates


    正确答案: B
    解析: 暂无解析

  • 第6题:

    单选题
    Which data organization schemes are supported?()
    A

    PARTITION BY HASH and ORGANIZE BY  

    B

    PARTITION BY RANGE and ORGANIZE BY KEY SEQUENCE  

    C

    PARTITION BY HASH and ORGANIZE BY KEY SEQUENCE 

    D

    PARTITION BY RANGE and ORGANIZE BY


    正确答案: A
    解析: 暂无解析

  • 第7题:

    多选题
    Which two statements are true about the primary key constraint in a table? ()
    A

    It is not possible to disable the primary key constraint.

    B

    It is possible to have more than one primary key constraint in a single table.

    C

    The primary key constraint can be referred by only one foreign key constraint.

    D

    The primary key constraint can be imposed by combining more than one column.

    E

    The non-deferrable primary key constraint creates an unique index on the primary key column if it is not already indexed.


    正确答案: D,B
    解析: 暂无解析

  • 第8题:

    单选题
    Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?()
    A

    A session key value is exchanged across the network.

    B

    A session key never passes across the network.

    C

    A session key is used as the key for asymmetric data encryption.

    D

    A session key is used as the key for symmetric data encryption.


    正确答案: A
    解析: 暂无解析

  • 第9题:

    多选题
    Which two statements about the Diffie-Hellman (DH) key exchange process are correct? ()(Choose two.)
    A

    In the DH key exchange process, the session key is never passed across the network.

    B

    In the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.

    C

    In the DH key exchange process, the session key is passed across the network to the peer for confirmation.

    D

    In the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security


    正确答案: A,B
    解析: 暂无解析

  • 第10题:

    Which two statements about the Diffie-Hellman (DH) key exchange process are correct?()

    • A、In the DH key exchange process, the session key is never passed across the network.
    • B、In the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.
    • C、In the DH key exchange process, the session key is passed across the network to the peer for confirmation.
    • D、In the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security

    正确答案:A,B

  • 第11题:

    Which two statements regarding asymmetric key encryption are true?()

    • A、The same key is used for encryption and decryption.
    • B、It is commonly used to create digital certificate signatures.
    • C、It uses two keys: one for encryption and a different key for decryption.
    • D、An attacker can decrypt data if the attacker captures the key used for encryption

    正确答案:A,B

  • 第12题:

    Which two statements are true about a bitmap index? ()

    • A、It is recommended for the columns that have unique values.
    • B、It can be converted to a B-tree index by using the ALTER INDEX command.
    • C、It has a bitmap segment for each distinct value in the key column, containing a string of bits in which each bit represents the presence or absence of a key column value.
    • D、Updating the key column locks the whole bitmap segment that contains the bit for the key value to be updated.

    正确答案:C,D

  • 第13题:

    单选题
    You are developing a method to decrypt data that was encrypted with the Triple DES Algorithm. The method accepts the following parameters:  The byte array to be decrypted, which is named cipherMessage  The key, which is named key   An initialization vector, which is named iv  You need to decrypt the message by using the TripleDES class and place the result in a string.  Which code segment should you use?()
    A

    A

    B

    B

    C

    C

    D

    D


    正确答案: C
    解析: 暂无解析

  • 第14题:

    多选题
    Which two statements are true about a bitmap index? ()
    A

    It is recommended for the columns that have unique values.

    B

    It can be converted to a B-tree index by using the ALTER INDEX command.

    C

    It has a bitmap segment for each distinct value in the key column, containing a string of bits in which each bit represents the presence or absence of a key column value.

    D

    Updating the key column locks the whole bitmap segment that contains the bit for the key value to be updated.


    正确答案: D,A
    解析: 暂无解析

  • 第15题:

    单选题
    Which of the following is used by BitLocker to lock an encryption key and protect data?()
    A

    ECP

    B

    IRQ

    C

    AGP

    D

    TPM


    正确答案: D
    解析: 暂无解析

  • 第16题:

    多选题
    Which two statements regarding symmetric key encryption are true?() (Choose two.)
    A

    The same key is used for encryption and decryption.

    B

    It is commonly used to create digital certificate signatures.

    C

    It uses two keys: one for encryption and a different key for decryption.

    D

    An attacker can decrypt data if the attacker captures the key used for encryption.


    正确答案: D,B
    解析: 暂无解析

  • 第17题:

    多选题
    Which two statements about the Diffie-Hellman (DH) key exchange process are correct?()
    A

    In the DH key exchange process, the session key is never passed across the network.

    B

    In the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.

    C

    In the DH key exchange process, the session key is passed across the network to the peer for confirmation.

    D

    In the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security


    正确答案: B,C
    解析: 暂无解析

  • 第18题:

    单选题
    Which constraint can be defines only at the column level? ()
    A

    UNIQUE

    B

    NOT NULL

    C

    CHECK

    D

    PRIMARY KEY

    E

    FOREIGN KEY


    正确答案: E
    解析: 暂无解析