单选题TippingPoint IPS对应用保护的过滤器分为哪几类?()A Attack Pretection,Reconnaissance,Security Policy,InformationalB Attack Pretection,Scan,Security Policy,InformationalC Attack Pretection,Reconnaissance,Misuser&Abuse,InformationalD Attack Pretectio,Scan,Security Policy

题目
单选题
TippingPoint IPS对应用保护的过滤器分为哪几类?()
A

Attack Pretection,Reconnaissance,Security Policy,Informational

B

Attack Pretection,Scan,Security Policy,Informational

C

Attack Pretection,Reconnaissance,Misuser&Abuse,Informational

D

Attack Pretectio,Scan,Security Policy,Misuser&Abuse


相似考题
更多“单选题TippingPoint IPS对应用保护的过滤器分为哪几类?()A Attack Pretection,Reconnaissance,Security Policy,InformationalB Attack Pretection,Scan,Security Policy,InformationalC Attack Pretection,Reconnaissance,MisuserAbuse,InformationalD Attack Pretectio,Scan,Security Policy,”相关问题
  • 第1题:

    Which statement describes the behavior of a security policy?()

    • A、The implicit default security policy permits all traffic.
    • B、Traffic destined to the device itself always requires a security policy.
    • C、Traffic destined to the device’s incoming interface does not require a security policy.
    • D、The factory-default configuration permits all traffic from all interfaces.

    正确答案:C

  • 第2题:

    过滤器的响应动作可以根据过滤器的保护类型进行配置,下列哪几类保护类型属于Application rotection?()

    • A、Attack Protection
    • B、Reconnaissance
    • C、Traffic Normalizations
    • D、Network Equipment Protection
    • E、Security Policy
    • F、Informational

    正确答案:A,B,E,F

  • 第3题:

    TippingPoint IPS对应用保护的过滤器分为哪几类?()

    • A、Attack Pretection,Reconnaissance,Security Policy,Informational
    • B、Attack Pretection,Scan,Security Policy,Informational
    • C、Attack Pretection,Reconnaissance,Misuser&Abuse,Informational
    • D、Attack Pretectio,Scan,Security Policy,Misuser&Abuse

    正确答案:A

  • 第4题:

    Which of the following security threats involves making phone calls?()

    • A、Phishing
    • B、Vishing
    • C、DDoS
    • D、Xmas attack

    正确答案:B

  • 第5题:

    What are three main phases of an attack?()

    • A、DoS
    • B、exploit
    • C、propagation
    • D、port scanning
    • E、reconnaissance

    正确答案:B,C,E

  • 第6题:

    You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()

    • A、Use Security Templates to correct the setting and export the security file.
    • B、Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.
    • C、Use Secedit /RefreshPolicy Machine_Policy command.
    • D、Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.

    正确答案:C

  • 第7题:

    You are the network administrator for . The network consists of single Active directory domain. The domain contains a Windows Server 2003 domain controller named TestKing3. The securews.inf security policy has been applied to the domain. A network application requires a service account. The network application runs constantly. You create and configure a service account named SrvAcct for the network application. The software functions properly using the new account and service. You discover an ongoing brute force attack against the SrvAcct account. The intruder appears to be attempting a distributed attack from several Windows XP Professional domain member computers on the LAN. The account has not been compromised and you are able to stop the attack, you restart Server6 and attempt to run the network application, but the application does not respond.()

    • A、Reset the SrvAcct password,
    • B、Configure the default Domain Controllers policy to assign the SrvAcct account the right to log on locally.
    • C、Unlock the SrvAcct account.
    • D、Restart the NetAppService service.

    正确答案:C

  • 第8题:

    单选题
    You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()
    A

    Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer account

    B

    Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checks

    C

    Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security template

    D

    On the IIS server, run the gpresult command from a command prompt and analyze the output


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    What is the function of Host Checker?()
    A

    To allow clientless access to the network

    B

    To restrict access to protected resources on the network

    C

    To scan an endpointfor compliance with security policies

    D

    To push a firewall policy to the endpoint's local firewall application


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    Which method is of gaining access to a system that bypasses normal security measures?()
    A

    Starting a Smurf attack

    B

    Conducting social engineering

    C

    Creating a back door

    D

    Launching a DoS attack


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()
    A

    Use Security Templates to correct the setting and export the security file.

    B

    Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.

    C

    Use Secedit /RefreshPolicy Machine_Policy command.

    D

    Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    TippingPoint IPS对应用保护的过滤器分为哪几类?()
    A

    Attack Pretection,Reconnaissance,Security Policy,Informational

    B

    Attack Pretection,Scan,Security Policy,Informational

    C

    Attack Pretection,Reconnaissance,Misuser&Abuse,Informational

    D

    Attack Pretectio,Scan,Security Policy,Misuser&Abuse


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Which three statements are true regarding IDP?()

    • A、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
    • B、IDP inspects traffic up to the Application layer.
    • C、IDP searches the data stream for specific attack patterns.
    • D、IDP inspects traffic up to the Presentation layer.
    • E、IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.

    正确答案:B,C,E

  • 第14题:

    BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate whatclassification of attack?()

    • A、Sniffing attack
    • B、Denial of service attack
    • C、Port Scan attack
    • D、Reconnaisance attack
    • E、Spoofing attack

    正确答案:E

  • 第15题:

    When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()

    • A、Third-party due diligence policy review
    • B、Remote Access Policy
    • C、Encryption Policy
    • D、Application change control policy
    • E、Security Personnel policy

    正确答案:A,B,D

  • 第16题:

    What are three configuration objects used to build JUNOS IDP rules?()

    • A、zone objects
    • B、policy objects
    • C、attack objects
    • D、alert and notify objects
    • E、network and address objects

    正确答案:A,C,E

  • 第17题:

    What is the function of Host Checker?()

    • A、To allow clientless access to the network
    • B、To restrict access to protected resources on the network
    • C、To scan an endpointfor compliance with security policies
    • D、To push a firewall policy to the endpoint's local firewall application

    正确答案:B

  • 第18题:

    You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()

    • A、Use secedit.exe to refresh the security policy.
    • B、Use the local computer policy to configure the local security policy.
    • C、Use security configuration and analysis to support the security files as a .pol file.
    • D、Use computer management to configure the security policy setting.

    正确答案:B

  • 第19题:

    单选题
    BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate whatclassification of attack?()
    A

    Sniffing attack

    B

    Denial of service attack

    C

    Port Scan attack

    D

    Reconnaisance attack

    E

    Spoofing attack


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()
    A

    Use secedit.exe to refresh the security policy.

    B

    Use the local computer policy to configure the local security policy.

    C

    Use security configuration and analysis to support the security files as a .pol file.

    D

    Use computer management to configure the security policy setting.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    Which statement describes the behavior of a security policy?()
    A

    The implicit default security policy permits all traffic.

    B

    Traffic destined to the device itself always requires a security policy.

    C

    Traffic destined to the device’s incoming interface does not require a security policy.

    D

    The factory-default configuration permits all traffic from all interfaces.


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following security threats involves making phone calls?()
    A

    Phishing

    B

    Vishing

    C

    DDoS

    D

    Xmas attack


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    You are the network administrator for . The network consists of single Active directory domain. The domain contains a Windows Server 2003 domain controller named TestKing3. The securews.inf security policy has been applied to the domain. A network application requires a service account. The network application runs constantly. You create and configure a service account named SrvAcct for the network application. The software functions properly using the new account and service. You discover an ongoing brute force attack against the SrvAcct account. The intruder appears to be attempting a distributed attack from several Windows XP Professional domain member computers on the LAN. The account has not been compromised and you are able to stop the attack, you restart Server6 and attempt to run the network application, but the application does not respond.()
    A

    Reset the SrvAcct password,

    B

    Configure the default Domain Controllers policy to assign the SrvAcct account the right to log on locally.

    C

    Unlock the SrvAcct account.

    D

    Restart the NetAppService service.


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    You need to design a strategy to ensure that all servers are in compliance with the business requirements for maintaining security patches. What should you do?()
    A

    Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the domain

    B

    Log on to each server and run Security Configuration and Analysis to analyze the security settings by using a custom security template

    C

    Create a logon script to run the secedit command to analyze all servers in the domain

    D

    Run the Microsoft Baseline Security Analyzer (MBSA) on a server to scan for Windows vulnerabilities on all servers in the domain


    正确答案: B
    解析: 暂无解析