syn-fin, syn-flood, and tcp-no-frag
syn-fin, port-scan, and tcp-no-flag
syn-fin, fin-no-ack, and tcp-no-frag
syn-fin, syn-ack-ack-proxy, and tcp-no-frag
第1题:
Which of the following is a valid source for Windows operating system updates?()
第2题:
Application Control Engine (ACE) can check the health of servers and server farms by configuring health probes (which are sometimes referred to as keepalives). A probe can be one of many types. Which are valid ACE probes? ()
第3题:
When configuring the messaging system, which of the following are valid parameters for the file transport? ()
第4题:
Which two statements about the use of SCREEN options are correct?()
第5题:
Which parameters are valid SCREEN options for combating operating system probes?()
第6题:
You plan to take a closed database backup using operating system commands. Which three SHUTDOWN options are appropriate for this type of backup?()
第7题:
Mark permitted traffic for firewall user authentication.
Mark permitted traffic for SCREEN options.
Associate permitted traffic with an IPsec tunnel.
Associate permitted traffic with a NAT rule.
Mark permitted traffic for IDP processing.
第8题:
The Cisco VIC can create an unlimited number of Virtual NICs
The number of vNICs on the Cisco VIC that can be created is determined by the number of chassis uplinks
vNICs are created using software on the host operating system
The host operating system sees a vNIC as a physical PCIe device
The host operating system sees a vNIC as a sub-interface of a primary NIC
The Cisco VIC can create 1024 vNICs
第9题:
SNA
RIS
RAS
WSUS
第10题:
HTTP
Java scripting
TCL scripting
RADIUS
TACACS
第11题:
rsh and ssh
Standard and VPN
rhost and .shosts
Classic and Enhanced
第12题:
V$VALID_NLS_VALUES
NLS_VALID_VALUES
NLS_VALUE_OPTIONS
V$NLS_VALUE_OPTIONS
V$NLS_VALID_VALUES
第13题:
Which two statements about the use of SCREEN options are correct? ()(Choose two.)
第14题:
Which of the following will help protect an operating system from vulnerability?()
第15题:
Which two functions of JUNOS Software are handled by the data plane?()
第16题:
Which parameters must you select when configuring operating system probes SCREEN options?()
第17题:
Which three advanced permit actions within security policies are valid?()
第18题:
SCN
Timestamp
Named recovery point
Transaction ID
Session ID
第19题:
Download free anti-virus programs from the Internet.
Perform updates from the manufacturers website regularly.
Using the operating systems email program only to open attachments.
Monitoring what is displayed on the screen.
第20题:
Format a partition, install device drivers, and install the operating system.
Create a partition, format the partition, and install the operating system.
Install the operating system, create a partition, and install device drivers.
Install the operating system, install device drivers, and create a partition.
第21题:
syn-fin, syn-flood, and tcp-no-frag
syn-fin, port-scan, and tcp-no-flag
syn-fin, fin-no-ack, and tcp-no-frag
syn-fin, syn-ack-ack-proxy, and tcp-no-frag
第22题:
System Resource Manager
Server BIOS
Guest Operating System
Hypervisor
第23题:
File Name
Operating System
Location
Host
Mode
第24题:
syn-fin, syn-flood, and tcp-no-frag
syn-fin, port-scan, and tcp-no-flag
syn-fin, fin-no-ack, and tcp-no-frag
syn-fin, syn-ack-ack-proxy, and tcp-no-frag