Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?()A. Disable TELNETB. Disable IGMP snoopingC. Enable TELNET but not SSLD. Disable ICMP/ping on device

题目
Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?()

A. Disable TELNET

B. Disable IGMP snooping

C. Enable TELNET but not SSL

D. Disable ICMP/ping on device


相似考题
更多“Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?() ”相关问题
  • 第1题:

    如果在access.conf中加上以下语句: order

    如果在access.conf中加上以下语句:

    <Directory/full/path/to/directory>

    <Limit GET POST>

    order mutual-failure

    deny from all

    allow from 220.168.141.145.www.ciu.net.cn

    </Limit>

    <Directory>

    上述说明了什么?


    正确答案:这说明只能是以域名为www.ciu.net.cn或IP属于220.168.141.145的客户访问该Web服务器。
    这说明只能是以域名为www.ciu.net.cn或IP属于220.168.141.145的客户访问该Web服务器。

  • 第2题:

    Which configuration command establishes an EBGP session to a peer in AS 300?()

    A. neighbor 200.16.1.2 remote-as 300

    B. bgp-neighbor 200.16.1.2 remote-as 300

    C. ebgp-neighbor 200.16.1.2 remote-as 300

    D. neighbor 200.16.1.2 remote-as 300 connection-type ebgp


    参考答案:A

  • 第3题:

    Network security consists of policies and practices to prevent and monitor( )access,misuse,modification, or denial of a computer network and network-accessible resources.Network security involves the authorization of access to data in a network,which is controlled by the network(请作答此空). Users choose or are assigned an ID and password or other authenticating information that allows them to access to information and programs within their authority.Network security secures the network,as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a( )name and a corresponding password. Network security starts with authentication.Once authenticated a ( ) enforces policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer( )or Trojans being transmitted over the network

    A.user
    B.agent
    C.server
    D.administrator

    答案:D
    解析:
    网络安全概念。

  • 第4题:

    Evaluate the following statements:What are the two consequences of the above statements?()

    A. Partitions of PURCHASE_ORDER_ITEMS have system-generated names.

    B. Both PURCHASE_ORDERS and PURCHASE_ORDER_ITEMS tables are created with four partitions each.

    C. Partitions of the PURCHASE_ORDER_ITEMS table exist in the same tablespaces as the partitions of the PURCHASE_ORDERS table.

    D. The PURCHASE_ORDER_ITEMS table inherits the partitioning key from the parent table by automatically duplicating the key columns.

    E. Partition maintenance operations performed on the PURCHASE_ORDER_ITEMS table are automatically reflected in the PURCHASE_ORDERS table.


    参考答案:B, C

  • 第5题:

    This graphic shows the results of an attempt to open a Telnet connection to router ACCESS1 from router Remote27. Which of the following command sequences will correct this problem? ()

    A. ACCESS1(config)# line console 0 ACCESS1(config-line)# password cisco

    B. Remote27(config)# line console 0 Remote27(config-line)# login Remote27(config-line)# password cisco

    C. ACCESS1(config)# line vty 0 4 ACCESS1(config-line)# login ACCESS1(config-line)# password cisco

    D. Remote27(config)# line vty 0 4 Remote27(config-line)# login Remote27(config-line)# password cisco

    E. ACCESS1(config)# enable password cisco

    F. Remote27(config)# enable password cisco


    参考答案:C

  • 第6题:

    下列关于apply方法说法正确的是()。

    A.apply方法是对DataFrame每一个元素应用某个函数的

    B.apply方法能够实现所有aggregate方法的功能

    C.apply方法和map方法都能够进行聚合操作

    D.apply方法只能够对行列进行操作


    D apply方法只能够对行列进行操作