Which of the following security threats are MOST likely prevented through user training?()
第1题:
A.IDS
B.VPN
C.NIPS
D.HIDS
第2题:
Which of the following network topologies is MOST likely to affect other devices on the network if there is a problem with one of the devices? ()
第3题:
Mike, a technician, is troubleshooting a printer issue. The print spooler for a local printer continues to fill up with new jobs and no jobs are being processed at the printer. Which of the following is MOST likely the cause?()
第4题:
Which of the following network devices would MOST likely be installed on a network to helpreduce broadcast traffic and to allow individual virtual networks?()
第5题:
A user attempts to login to a bookmarked site but is prompted for their social security number,mother’s maiden name and date of birth. Which of the following has MOST likely happened?()
第6题:
A user connecting a laptop to a wall jack is prompted for user credentials before being grantedaccess to the network. Which of the following is MOST likely implemented on the switch?()
第7题:
Which of the following types of software protection will help mitigate any threats coming fromworms or Trojans?()
第8题:
Virus
Worm
Network bandwidth
Malware
第9题:
Spam blocker
Anti-Virus
Anti Spyware
Anti adware
第10题:
The website has updated the security policies.
The user’s identity has been stolen.
The browser has been hijacked.
The user typed the website address incorrectly.
第11题:
Wireless
Brightness
Sleep Mode
NumPad
Power
第12题:
The network connection is unavailable.
The printer is offline.
The user does not have the proper security permissions.
The print spooler is stopped.
第13题:
A.Update antivirus definitions
B.MAC filtering
C.Effective security policies
D.User awareness training
第14题:
In an environment with STP disabled, which of the following is the MOST likely cause of the exponential increase in repeated packets transferred through the network?()
第15题:
Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()
第16题:
Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()
第17题:
Bob, a user, reports that his computer is running slower since he viewed an online training presentation. Bob is also receiving an increased amount of spam email. Which of the following is the MOST likely cause of Bob’s issue?()
第18题:
A user took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. The user can reach the Internet, but cannot access any internal network resources. Which of the following is the MOST likely reason?()
第19题:
Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()
第20题:
Update antivirus definitions
MAC filtering
Effective security policies
User awareness training
第21题:
Virus
Worm
Network bandwidth
Malware
第22题:
Network Intrusion
Adware Popups
Social Engineering
Spam Messages
第23题:
MAC filtering
PoE
IP filtering
802.1X