Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()A.Update antivirus definitionsB.MAC filteringC.Effective security policiesD.User awareness training

题目
Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()

A.Update antivirus definitions

B.MAC filtering

C.Effective security policies

D.User awareness training


相似考题
更多“Which of the following security mitigation techniques is the MOST effective against zero-day attacks?() ”相关问题
  • 第1题:

    We have lodged a claim () ABC & Co.() the quality of the goods shipped()m.v. “Peace”.

    A、against, for, by

    B、with, for, under

    C、on, against, as per

    D、to, for, per


    参考答案:A

  • 第2题:

    ASystempadministratorneedstosetthedefaultpasswordlengthforalluserstosixcharacters.Whichofthefollowingfilesneedstobeeditedtoaccomplishthis()

    A./etc/security/limits

    B./etc/security/mkuser.sys

    C./etc/security/priv

    D./etc/security/user


    参考答案:D

  • 第3题:

    Reliable delivery of messages is ensured by ______ techniques.

    A.forward error correction

    B.aftward error correction

    C.DGPS

    D.error-free and low error reception


    正确答案:A

  • 第4题:

    Which three represent IDP policy match conditions? ()(Choose three.)

    A.protocol

    B.source-address

    C.port

    D.application

    E.attacks


    参考答案:B, D, E

  • 第5题:

    ASystempadministratorisinvestigatingapossiblesecuritybreechandwantstoreviewinformationaboutfailedloginattemptstothesystem.Whichofthefollowingcommandswillshowthis()

    A.fwtmp</etc/security/failedlogin

    B.cat/etc/security/failedlogin

    C.who

    D.alog-f/etc/security/failedlogin-o


    参考答案:A

  • 第6题:


    According to Para.7,which of the following is not the way that passage suggests to improve cyber-security?( )

    A.Be quick to predict and respond when there is insecurity.
    B.Make sure everyone is equipped with fundamental knowledge of cyber-security.
    C.Be cooperative with counterparts on cyber-security.
    D.Be cautious using Internet.

    答案:D
    解析: