Which of the following is NOT true of security attacks?[A] Employees will keep up with security polices and awareness if they are highly-trained.[B] The rate of security attacks appears faster than the growth of the Internet.[C] One's computer system will

题目

Which of the following is NOT true of security attacks?

[A] Employees will keep up with security polices and awareness if they are highly-trained.

[B] The rate of security attacks appears faster than the growth of the Internet.

[C] One's computer system will never be secure.

[D] Vulnerabilities can go through phones, wireless devices, and network appliances


相似考题
更多“Which of the following is NOT true of security attacks? [A] Employees will keep up ”相关问题
  • 第1题:

    Which cisco security product line uses deep inspection to identify and prevent malicious attacks, resource misuse, and unauthorized access?()

    A.MARS

    B.NAC

    C.VPN

    D.IPS


    参考答案:D

  • 第2题:

    共用题干
    第二篇

    Hack

    The first big-name hackers include Steve Wozniak,Bill Gates and Linus Torvalds,all now highly recog-
    nizable names behind many of the computer technologies used today. These early hackers had a love of tech-
    nology and a compelling need to know how it all worked,and their goal was to push programs beyond what
    they were designed to do.Back then,the word"hacker" didn't have the negative connotation it has today.
    The original hacker ethic,rooted out of simple curiosity and a need to be challenged,appears to be dead.
    The objectives of early hackers are a far cry from the goals of today'S hacker. The motivation of the new
    breed of hackers appears not to be curiosity,or a hunger for knowledge,as it used to be.Instead,most of to-
    day'S hackers are driven by greed,power,revenge,or some other malicious intent,treating hacking as a game
    or sport,employing the tools that are retdily available via the Internet.
    The rate of security attacks is actually outpacing the growth of the Internet.This means that something
    besides the growth of the Internet is driving the rise in security attacks.Here are some realities you should
    know about:Operating systems and applications will never be secure.New vulnerabilities will be introduced
    into your environment every day.And even if you ever do get one operating system secure,there will be new
    operating systems with new vulnerabilities一phones,wireless devices,and network appliances.Employees will
    never keep up with security polices and awareness.It doesn't matter how much you train and educate your
    employees.If your employees disregard warnings about the hazards of opening questionable e-mail attach-
    ments,how are you going to educate them about properly configuring firewalls and intrusion detection systems
    for their PCs?Managers have more responsibility than ever. And on top of the realities listed above,security
    managers are being asked to support increasing degrees of network availability and access.There are some
    good security measures you can take:Employ a layer 7,full-inspection firewall.Automatically update your
    anti-virus at the gateway,server and client. Keep all of your systems and applications updated.Hackers com-
    monly break into a website through known security holes,so make sure your servers and applications are
    patched and up to date.Turn off unnecessary network services.Eliminate all unneeded programs.Scan net-
    work for common backdoor services一use intrusion detection systems,vulnerability scans,anti-virus protection.

    Which of the following is NOT true of security attacks?
    A:Employees will keep up with security polices and awareness if they are highly-trained.
    B:The rate of security attacks appears faster than the growth of the Internet.
    C:One's computer system will never be secure.
    D:Vulnerabilities can go through phones,wireless devices,and network appliances.

    答案:A
    解析:
    本题的相关信息在文章的第一段。Steve Wozniak , Bill Gates and Linus Torvalds都是一 些早期的著名黑客,不同于现今的黑客,他们出于好奇,勇于挑战计算机和网络科技的漏洞,并 以此推动计算机和网络科技的进步。
    黑客指的是计算机和网络科技方面的专家,可以进人计算机系统,所以D是正确答案。
    依据是第三段中“Employees will never keep up with security polices and awareness.It doesn't matter how much you train and educate your employees”。
    文中与之相关的内容是第三段的“If your employees disregard warnings about the hazards of opening questionable e一mail attachments,how are you going to educate them about properly con- figuring firewalls and intrusion detection systems for their PCs?"。这与B项的意思不一致。
    其依据是第三段倒数第三句“Turn off unnecessary network services.”即关闭不必要的网 络服务,而不是关闭所有的网络服务。一字之差,却相去甚远,要注意辨析。

  • 第3题:

    Which of the following statements is NOT true?()

    AHenry VII refilled the royal treasury through loans,subsidies,property levies and fines.

    BHenry VII forbade the nobles to keep excessive power.

    CHenry VII built up England.s navy and foreign trade.

    DHenry VII completely neglected parliament as though it never existed.


    D

  • 第4题:

    A customer wants to check whether they have the necessary tools enabled to prevent intrusions andvirus attacks on a Windows Vista workstation. Which of the following tools can be used to display thecurrent configuration? ()

    • A、Security Center
    • B、Event Viewer Security log
    • C、Windows Defender
    • D、Windows Firewall

    正确答案:A

  • 第5题:

    You are responsible for increasing the security within the Company LAN. Of the following choices  listed below,  which is true regarding layer 2 security and mitigation techniques? ()

    • A、 Enable root guard to mitigate ARP address spoofing attacks.
    • B、 Configure DHCP spoofing to mitigate ARP address spoofing attacks.
    • C、 Configure PVLANs to mitigate MAC address flooding attacks.
    • D、 Enable root guard to mitigate DHCP spoofing attacks.
    • E、 Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted  ports.
    • F、 Configure port security to mitigate MAC address flooding  
    • G、 None of the other alternatives apply

    正确答案:F

  • 第6题:

    Birthday attacks are used against which of the following?()

    • A、 digital signatures
    • B、 symmetric ciphering
    • C、 hashalgoritms
    • D、 asymmetric ciphering
    • E、 digital certificates

    正确答案:C

  • 第7题:

    Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()

    • A、Network diagram
    • B、Performance baseline
    • C、Network security procedure
    • D、Company policy

    正确答案:A

  • 第8题:

    Examine the following RMAN command:   BACKUP DATABASE TAG TESTDB  KEEP UNTIL ’SYSDATE+1’ RESTORE POINT TESTDB06;   Which two statements are true regarding the backup taken by using the above RMAN command?()  

    • A、 Only data files and the control file are backed up.
    • B、 Archived redo logs are backed up only if the database is open during the backup.
    • C、 The backup is deleted after one day,regardless of the default retention policy settings. 
    • D、 The backup becomes obsolete after one day,regardless of the default retention policy settings.

    正确答案:B,D

  • 第9题:

    多选题
    The Company security administrator is concerned with VLAN hopping based attacks. Which two  statements about these attacks are true? ()
    A

    Attacks are prevented by utilizing the port-security feature.

    B

    An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.

    C

    Configuring an interface with the switchport mode dynamic command will prevent VLAN  hopping.

    D

    An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q  encapsulation.

    E

    Configuring an interface with the switchport mode access command will prevent VLAN  hopping.


    正确答案: A,D
    解析: 暂无解析

  • 第10题:

    单选题
    Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()
    A

    Update antivirus definitions

    B

    MAC filtering

    C

    Effective security policies

    D

    User awareness training


    正确答案: A
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements are true regarding IDP?()
    A

    IDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.

    B

    IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.

    C

    IDP inspects traffic up to the Presentation layer.

    D

    IDP inspects traffic up to the Application layer.


    正确答案: A,B
    解析: 暂无解析

  • 第12题:

    单选题
    A customer wants to check whether they have the necessary tools enabled to prevent intrusions andvirus attacks on a Windows Vista workstation. Which of the following tools can be used to display thecurrent configuration? ()
    A

    Security Center

    B

    Event Viewer Security log

    C

    Windows Defender

    D

    Windows Firewall


    正确答案: C
    解析: 暂无解析

  • 第13题:

    Text 3 The first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, all now highly recognizable names behind many of the computer technologies used today. These early hackers had a love of technology and a compelling need to know how it all worked, and their goal was to push programs beyond what they were designed to do. Back then, the word "hacker" didn't have the negative connotation it has today. The original hacker ethic, rooted out of simple curiosity and a need to be challenged, appears to be dead.

    The objectives of early hackers are a far cry from the goals of today's hacker. The motivation of the new breed of hackers appears not to be curiosity, or a hunger for knowledge, as it used to be. Instead, most of today's hackers are driven by greed, power, revenge, or some other malicious intent, treating hacking as a game or sport, employing the tools that are readily available via the Internet.

    The rate of security attacks is actually outpacing the growth of the Internet. This means that something besides the growth of the Internet is driving the rise in security attacks. Here are some realities you should know about: Operating systems and applications will never be secure. New vulnerabilities will be introduced into your environment every day. And even if you ever do get one operating system secure, there will be new operating systems with new vulnerabilities—phones, wireless devices, and network appliances. Employees will never keep up with security polices and awareness. It doesn't matter how much you train and educate your employees. If your employees disregard warnings about the hazards of opening questionable email attachments, how are you going to educate them about properly configuring firewalls and intrusion detection systems for their PCs? Managers have more responsibility than ever. And on top of the realities listed above. security managers are being asked to support increasing degrees of network availability and access.

    There are some good security measures you can take: Employ a layer 7, full-inspection firewall. Automatically update your anti-virus at the gateway, server and client. Keep all of your systems and applications updated. Hackers commonly break into a Web site through known security holes, so make sure your servers and applications are patched and up to date. Turn off unnecessary network services. Eliminate all unneeded programs. Scan network for common backdoor services—Use intrusion detection systems, vulnerability scans, antivirus protection.

    第31题:Which of the following statements of Steve Wozniak, Bill Gates and Linus Torvalds is TRUE?

    [A] They are all good examples of today's computer users.

    [B] They are driven by greed, power, revenge, or some other malicious intent.

    [C] Their goal is to push programs beyond what they are designed to do.

    [D] They are all dead.


    正确答案:C
    本题的相关信息在文章的第一段。Steve Wozniak, Bill Gates and Linus Torvalds 都是一些早期的著名黑客。不同于现今的黑客,他们都是出于好奇,勇于挑战计算机和网络科技的漏洞,并以此推动计算机和网络科技的进步。

  • 第14题:

    共用题干
    Hack
    The first big-name hackers included Steve Wozniak,Bill Gates and Linus Torvalds,all now highly recognizable names behind many of the computer technologies used today.These early hackers had a love of technology and a compelling need to know how it all worked,and their goal was to push programs beyond what they were designed to do.Back then,the word“hacker”didn't have the negative connotation it has today.The original hacker ethic,rooted out of simple curiosity and a need to be challenged,appears to be dead.
    The objectives of early hackers are a far cry from the goals of today's hackers.The motivation of the new breed of hackers appears not to be curiosity,or a hunger for knowledge,as it used to be.Instead,most of today's hackers are driven by greed,power,revenge,or some other malicious intent,treating hacking as a game or sport,employing the tools that are readily available via the Internet.
    The rate of security attacks is actually outpacing the growth of the Internet.This means that something besides the growth of the Internet is driving the rise in security attacks.Here are some realities you should know about:Operating systems and applications will never be secure.New vulnerabilities will be introduced into your environment every day.And even if you ever do get one operating system secure,there will be new operating systems with new vu1nerabilities-phones,wireless devices,and network appliances.Employees will never keep up with security policies and awareness.It doesn't matter how much you train and educate your employees.if your employees disregard warnings about the hazards of opening questionable e-mail attachments,how are you going to educate them about properly configuring firewalls and intrusion detection systems for their PCs?Managers have more responsibility than ever.And on top of the realities listed above,security managers are being asked to support increasing degrees of network availability and access.There are some good security measures you can take:Employ a layer 7,full-inspection firewall.Automatically update your anti-virus at the gateway,server and client.Keep all of your systems and applications updated.Hackers commonly break into a website through known security holes,so make sure your servers and applications are patched and up to date.Turn off unnecessary network services.
    Eliminate all unneeded programs.Scan network for common backdoor services一use intrusion detection systems, vulnerability scans,anti-virus protection.

    Which of the following is NOT true of security attacks?
    A:Employees will keep up with security polices and awareness if they are highly-trained.
    B:The rate of security attacks appears faster than the growth of the Internet.
    C:One's computer system will never be secure.
    D:Vulnerabilities can go through phones,wireless devices,and network appliances.

    答案:A
    解析:
    根据第一段第一、二句可知,Steve Wozniak , Bill Gates和Linus Torvalds都是早期的黑客,早期黑客的目标是扩展程序的用途(to push programs beyond what they were designed to do ),故选C项。
    根据第三段倒数第四句“Hackers commonly break into a website …”可知,黑客通常通过已知的安全漏洞侵入电脑系统,所以D项是正确答案。
    第三段第六、七句表明,员工永远不能与安全策略和安全意识的更新保持一致,这跟他们接受多少培训和教育无关。
    由第三段第四句可知,A项表述正确;由第三段第九句可知,C项表述正确;由第三段倒数第八句可知,D项表述正确。由第三段第八句可知,B项的意思与原文表述不一致。
    由第三段倒数第七、四、二句可知,玖C、D三项都正确。第三段倒数第三句提到," Turnoff unnecessary network services.”即关闭不必要的网络服务,而不是关闭所有的网络服务。所以A项不正确。

  • 第15题:

    Which of the following is true about Outbound Malware Scanning?() 

    • A、 It has its own policy table.
    • B、 It is configured as part of Access Policies.
    • C、 It is configured as part ofIronPort data Security.
    • D、 It only has global configuration.

    正确答案:B

  • 第16题:

    Which of the following statements is NOT true?()

    • A、Henry VII refilled the royal treasury through loans,subsidies,property levies and fines.
    • B、Henry VII forbade the nobles to keep excessive power.
    • C、Henry VII built up England.s navy and foreign trade.
    • D、Henry VII completely neglected parliament as though it never existed.

    正确答案:D

  • 第17题:

    The Company security administrator is concerned with VLAN hopping based attacks. Which two  statements about these attacks are true? ()

    • A、 Attacks are prevented by utilizing the port-security feature.
    • B、 An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.
    • C、 Configuring an interface with the switchport mode dynamic command will prevent VLAN  hopping.
    • D、 An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q  encapsulation.
    • E、 Configuring an interface with the "switchport mode access" command will prevent VLAN  hopping.

    正确答案:B,E

  • 第18题:

    Which cisco security product line uses deep inspection to identify and prevent malicious attacks,resource misuse, and unauthorized access?()

    • A、MARS
    • B、NAC
    • C、VPN
    • D、IPS

    正确答案:D

  • 第19题:

    Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()

    • A、Honeynet
    • B、Honeypot
    • C、Vulnerability scanner
    • D、Network based IDS

    正确答案:A

  • 第20题:

    You have just performed a FLASHBACK TABLE operation using the following command:   flashback table employees to scn 123456;   The employees table has triggers associated with it.  Which of the following statements is true regarding the state of the triggers during the Flashback Table operation?()  

    • A、 All the triggers are disabled.
    • B、 All the triggers are enabled by default.
    • C、 Enabled triggers remain enabled and disabled triggers remain disabled.
    • D、 Triggers are deleted when a Flashback Table operation is performed.

    正确答案:A

  • 第21题:

    单选题
    Which of the following statements is TRUE of telecommuting?
    A

    It is up to the employees to accept it or not.

    B

    It is getting popular in different companies.

    C

    It is a new untested way of working.

    D

    It is a traditional work arrangement.


    正确答案: D
    解析:
    推理判断题。文章第二段第一句“In reality, researchers continue to find strong growth and acceptance of telecommuting.”可知,远程办公越来越受到人们的欢迎,这种趋势也在不断地增长。B项是对这句话的同义转述,是正确答案。A项与文中意思不符,根据文中第四段第三句,无论是经理还是人力资源的专家,在你开始远程办公之前还有一系列的决策和行动。由此可知,是否实行远程办公是由经理或人力资源部等领导做出决定的。C项与原文意思完全相反,根据第三段最后一句,远程办公并不是一种新奇的、未经试验的工作方式。D项与原文意思矛盾,根据第三段首句,远程办公对工作的安排不同于传统的做法。

  • 第22题:

    单选题
    Which of the following is true according to the passage?
    A

    All the adults in the UK are very lazy

    B

    Half of the children are very fat before they go to school

    C

    Pets will be in trouble if their owners don’t keep healthy

    D

    All people in Glasgow feel ashamed because they don’t get enough exercise


    正确答案: B
    解析:
    推理判断题。第二段提到“half of the adults are so lazy”,因此A项“所有的成年人都很懒惰”属于以偏概全;第六段提到“one in six children in the UK are very fat before they start school”,所以B项中的“一半”错误。倒数第二段提到“Glasgow, was shamed as the laziest city in the UK, with 75% asked thinking they do not get enough exercise”,所以D项中的“all the people”也属于以偏概全。因此C项正确。

  • 第23题:

    多选题
    Which three statements are true regarding IDP?()
    A

    IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.

    B

    IDP inspects traffic up to the Application layer.

    C

    IDP searches the data stream for specific attack patterns.

    D

    IDP inspects traffic up to the Presentation layer.

    E

    IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.


    正确答案: A,B
    解析: 暂无解析