Signature-based NIPS
Signature-based NIDS
Honeypot
Behavior-based HIDS
第1题:
After installing a new p5 595, the system performs poorly. Which of the following services would provide updates needed to fix the problem?()
第2题:
Which of the following should an administrator do after running a command from the console onthe perimeter router?()
第3题:
What will be enabled by the scanning technology-The Dynamic Vector Streaming (DVS)?()
第4题:
下面哪一项是对IDS的正确描述?()
第5题:
An administrator receives a contract for a server install at a new building. Which of the followingshould be completed after installing the server?()
第6题:
Which of the following should an administrator utilize FIRST after installing a new HBA?()
第7题:
A system administrator decides to review the system error log after installing new hardware. Which of the following is the correct command to use?()
第8题:
Update drivers, update operating system (e.g. Windows Update), create server baseline, createa new network diagram, update change management procedures
Create server baseline, label server, store vendor-specific documentation, update networkdiagrams, update asset tracking information
Create server baseline, assign server roles, install tape drive, delete network diagram, labelserver, update operating system (e.g. Windows Update)
Install applications on server, install external drives, toss vendor-specific documentation,update network diagrams
第9题:
New Technology File Systems (NTFS)
Digitally signed device drivers
Virtual machine components
Multiple RAID configurations
第10题:
New Technology File Systems (NTFS)
Digitally signed device drivers
Virtual machine components
Multiple RAID configurations
第11题:
Signature-based NIPS
Signature-based NIDS
Honeypot
Behavior-based HIDS
第12题:
Document the process and update the baseline.
Test the theory of probable cause and verify with the software vendor.
Establish a plan of action to be included in the business impact analysis.
Implement the software manufacturer workaround.
第13题:
A technician has just finished installing a new server into a server rack. Which of the following should the technician do NEXT to complete the installation documentation?()
第14题:
A technician finished installing antivirus software. Which of the following should the technician perform NEXT?()
第15题:
Which key method is used to detect and prevent attacks by use of IDS and/or IPS technologies?()
第16题:
Which of the following requires an update to the baseline after installing new software on a machine?()
第17题:
After installing a new optical drive into a workstation, which of the following will ask for anacknowledgement?()
第18题:
Which of the following procedures should be performed to minimize possible problems for a customer when updating software?()
第19题:
A technician has fixed a reported issue with a heavily used software program and users have verified that the program is working correctly. Which of the following should the technician do NEXT?()
第20题:
Alert
Fix Central
Software Maintenance
Performance Monitoring
第21题:
基于特征(Signature-based)的系统可以检测新的攻击类型
基于特征(Signature-based)的系统比基于行为(behavior-based)的系统产生更多的误报
基于行为(behavior-based)的系统维护状态数据库来与数据包和攻击相匹配
基于行为(behavior-based)的系统比基于特征(Signature-based)的系统有更高的误报
第22题:
Run CHKDSK
Boot to ERD
Run MSCONFIG
Go into Safe Mode
第23题:
IRQ Manager
BIOS
Device Manager
Hardware Compatibility List
第24题:
errpt
syslog
prtdiag
errlogger