Which method is of gaining access to a system that bypasses normal security measures?()
第1题:
After creating backups of critical system and user data, which of the following is the BEST location to store the backups?()
第2题:
A service provider wants to prevent the repeat of a denial of service (DoS) attack that recently disabled Internet access for several thousand customers. Which Cisco solution best matches this business need?()
第3题:
Which of the following security features are enabled by default after creating an instance?()
第4题:
What are three security problems with Wi-Fi Protected Access (WPA)?()
第5题:
Observe the following options carefully, which two attacks focus on RSA? ()
第6题:
Which of the following helps protect important confidential information from being publiclydisclosed?()
第7题:
A user reports that their system is starting to run slower, especially when opening large local files. The system has sufficient RAM for the users applications, but the hard drive seems to have higher than normal activity when opening large files. Which of the following would be the BEST tool to diagnose and troubleshoot this problem? ()
第8题:
Which of the following are examples of physical security measures?()
第9题:
low lube oil temperature
low starting air temperature
air in the fuel injection
water in the starting air system
第10题:
Starting a Smurf attack
Conducting social engineering
Creating a back door
Launching a DoS attack
第11题:
low lube oil temperature
low starting air temperature
air bubbles in the fuel oil system
water in the starting air system
第12题:
in boiler drums
in refrigerating plants
in starting air pipes
in air coolers
第13题:
Choose the service component in the optimize phase which assesses the wlan system and drives continuous improvements by recommending remediation measures including device configuration optimization, capacity planning, traffic analysis, security assessment, ()and quality issue resolution.
第14题:
A service provider wants to prevent the repeat of a denial of service (DoS) attack that recently disabled Internet access for several thousand customers. Which Cisco solution best matches this business need?()
第15题:
What are four methods used by hackers? ()
第16题:
Which feature would prevent guest users from gaining network access by unplugging an IP phone and connecting a laptop computer?()
第17题:
Which of the following access levels allows a user to perform normal day to day work with their own files but does not allow them to change system files or computer performance?()
第18题:
Which of the following security threats involves making phone calls?()
第19题:
A technician is troubleshooting a user’s problem; important Windows services are not starting. In which of the following locations should the technician check to investigate when these services started or stopped?()
第20题:
You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?()
第21题:
In the supply closet so anyone can access them if needed
Near the server for easy access to restore files
Locked in a cabinet in the IT Manager’s office
At a secure off-site storage facility
第22题:
IPSec VPN
SSL VPN
port security
port security with statically configured MAC addresses
private VLANs
第23题:
WPA is based on the outdated IEEE 802.11i standard.
WPA uses RSN,which uses the same base encryption algorithm as RC4.
WPA requires a hardware upgrade that may not be supported by all vendors.
WPA uses TKIP,which uses the same base encryption algorithm as WEP.
WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.
WPA is susceptible to a security weakness when preshared keys are used.