参考答案和解析
正确答案: D
解析: 暂无解析
更多“单选题Which of the following types of software protection will help mitigate any threats coming fromworms or Trojans?()A Spam blockerB Anti-VirusC Anti SpywareD Anti adware”相关问题
  • 第1题:

    Which of the following types of software protection will help mitigate any threats coming fromworms or Trojans?()

    A. Spam blocker

    B. Anti-Virus

    C. Anti Spyware

    D. Anti adware


    参考答案:B

  • 第2题:

    Malware has been detected and removed on a customer computer several times in a short periodof time. Which of the following will BEST help prevent future occurrences?()

    • A、Defragment the hard drive
    • B、Discuss safe web-browsing habits with the customer
    • C、Delete temporary files, cookies and browser history
    • D、Install anti-virus software which uses manual updates

    正确答案:B

  • 第3题:

    Which of the following is unsafe for a technician to use when troubleshooting or repairing a CRT monitor?()

    • A、Anti-static pad
    • B、Anti-static wrist strap
    • C、Rubber gloves
    • D、Multimeter

    正确答案:B

  • 第4题:

    Which of the following will MOST likely cause major performance issues on an email server?()

    • A、RAID 0 configuration
    • B、PBX software
    • C、DHCP server
    • D、Anti-virus software

    正确答案:D

  • 第5题:

    A user is reporting that they are getting pop-ups while they are not actively browsing the Internet.Which of the following would BEST resolve this issue?()

    • A、Antivirus
    • B、Firewall
    • C、Anti-spyware
    • D、Pop-upblocker

    正确答案:C

  • 第6题:

    Which of the following types of software protection will help mitigate any threats coming fromworms or Trojans?()

    • A、Spam blocker
    • B、Anti-Virus
    • C、Anti Spyware
    • D、Anti adware

    正确答案:B

  • 第7题:

    You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails.Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?()

    • A、set security policies from-zone dmz to-zone untrust policy anti-spam then permit application- services utm-policy Block-Spam
    • B、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services utm-policy Block-Spam
    • C、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services anti-spam-policy
    • D、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services Block-Spam

    正确答案:B

  • 第8题:

    单选题
    Which of the following is the MOST effective method to restrict staff members from accessing a service on a company server?()
    A

     Implement ACLs.

    B

     Disable accounts for staff members who do not require server access.

    C

     Implement anti-spam software on the server.

    D

     Implement anti-virus software on the server.


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following types of software protection will help mitigate any threats coming fromworms or Trojans?()
    A

    Spam blocker

    B

    Anti-Virus

    C

    Anti Spyware

    D

    Anti adware


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    Which of the following is the MOST effective method to restrict staff members from accessing a service on a company server?()
    A

    Implement ACLs.

    B

    Disable accounts for staff members who do not require server access.

    C

    Implement anti-spam software on the server.

    D

    Implement anti-virus software on the server.


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()
    A

    Intrusion detection

    B

    Virtualization

    C

    Kiting

    D

    Cloning


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following is an example of a security technology that could be enabled by Netflow?()
    A

     Anomaly Detection

    B

     SYN Cookies

    C

     Application Inspection

    D

     Content filtering

    E

     Anti-X Protection

    F

     Anti Virus


    正确答案: E
    解析: 暂无解析

  • 第13题:

    Which of the following is the MOST effective method to restrict staff members from accessing a service on a company server?()

    A. Implement ACLs.

    B. Disable accounts for staff members who do not require server access.

    C. Implement anti-spam software on the server.

    D. Implement anti-virus software on the server.


    参考答案:A

  • 第14题:

    Which of the following web browser features deters users from visiting spoofed sites?()

    • A、Anti-malware detection
    • B、Anti-phishing filters
    • C、Anti-spyware filters
    • D、Antivirus engines

    正确答案:B

  • 第15题:

    An administrator needs to update the anti-virus, security patches, BIOS, and the web server software on a production system. Which of the following is the BEST method to accomplish this?()

    • A、Update anti-virus, security patches, BIOS software, and then the web software.
    • B、Update the web software, security patches, anti-virus, and then the BIOS.
    • C、Update security patches, BIOS, web software, and then the anti-virus.
    • D、The order does not matter, only one change at a time should be done.

    正确答案:C

  • 第16题:

    Which of the following is the MOST effective method to restrict staff members from accessing a service on a company server?()

    • A、Implement ACLs.
    • B、Disable accounts for staff members who do not require server access.
    • C、Implement anti-spam software on the server.
    • D、Implement anti-virus software on the server.

    正确答案:A

  • 第17题:

    Which of the following security threats are MOST likely prevented through user training?()

    • A、Network Intrusion
    • B、Adware Popups
    • C、Social Engineering
    • D、Spam Messages

    正确答案:C

  • 第18题:

    How do you apply UTM enforcement to security policies on the branch SRX series?()

    • A、UTM profiles are applied on a security policy by policy basis.
    • B、UTM profiles are applied at the global policy level.
    • C、Individual UTM features like anti-spam or anti-virus are applied directly on a security policy by policy basis.
    • D、Individual UTM features like anti-spam or anti-virus are applied directly at the global policy level.

    正确答案:A

  • 第19题:

    单选题
    You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails.Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?()
    A

    set security policies from-zone dmz to-zone untrust policy anti-spam then permit application- services utm-policy Block-Spam

    B

    set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services utm-policy Block-Spam

    C

    set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services anti-spam-policy

    D

    set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services Block-Spam


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    An administrator needs to update the anti-virus, security patches, BIOS, and the web server software on a production system.  Which of the following is the BEST method to accomplish this?()
    A

     Update anti-virus, security patches, BIOS software, and then the web software.

    B

     Update the web software, security patches, anti-virus, and then the BIOS.

    C

     Update security patches, BIOS, web software, and then the anti-virus.

    D

     The order does not matter, only one change at a time should be done.


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    Malware has been detected and removed on a customer computer several times in a short periodof time. Which of the following will BEST help prevent future occurrences?()
    A

    Defragment the hard drive

    B

    Discuss safe web-browsing habits with the customer

    C

    Delete temporary files, cookies and browser history

    D

    Install anti-virus software which uses manual updates


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    A user has discovered that even though they are using the latest version of the anti-virus software,the computer is still being infected by a virus. Which of the following is the BEST solution for this problem?()
    A

    Replace the computer.

    B

    Run chkdsk /f.

    C

    Update the virus signatures.

    D

    Run scandisk.


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    How do you apply UTM enforcement to security policies on the branch SRX series?()
    A

    UTM profiles are applied on a security policy by policy basis.

    B

    UTM profiles are applied at the global policy level.

    C

    Individual UTM features like anti-spam or anti-virus are applied directly on a security policy by policy basis.

    D

    Individual UTM features like anti-spam or anti-virus are applied directly at the global policy level.


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    Which of the following will MOST likely cause major performance issues on an email server?()
    A

     RAID 0 configuration

    B

     PBX software

    C

     DHCP server

    D

     Anti-virus software


    正确答案: A
    解析: 暂无解析