Attack Pretection,Reconnaissance,Security Policy,Informational
Attack Pretection,Scan,Security Policy,Informational
Attack Pretection,Reconnaissance,Misuser&Abuse,Informational
Attack Pretectio,Scan,Security Policy,Misuser&Abuse
第1题:
Which statement describes the behavior of a security policy?()
第2题:
过滤器的响应动作可以根据过滤器的保护类型进行配置,下列哪几类保护类型属于Application rotection?()
第3题:
TippingPoint IPS对应用保护的过滤器分为哪几类?()
第4题:
Which of the following security threats involves making phone calls?()
第5题:
What are three main phases of an attack?()
第6题:
You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()
第7题:
You are the network administrator for . The network consists of single Active directory domain. The domain contains a Windows Server 2003 domain controller named TestKing3. The securews.inf security policy has been applied to the domain. A network application requires a service account. The network application runs constantly. You create and configure a service account named SrvAcct for the network application. The software functions properly using the new account and service. You discover an ongoing brute force attack against the SrvAcct account. The intruder appears to be attempting a distributed attack from several Windows XP Professional domain member computers on the LAN. The account has not been compromised and you are able to stop the attack, you restart Server6 and attempt to run the network application, but the application does not respond.()
第8题:
Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer account
Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checks
Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security template
On the IIS server, run the gpresult command from a command prompt and analyze the output
第9题:
To allow clientless access to the network
To restrict access to protected resources on the network
To scan an endpointfor compliance with security policies
To push a firewall policy to the endpoint's local firewall application
第10题:
Starting a Smurf attack
Conducting social engineering
Creating a back door
Launching a DoS attack
第11题:
Use Security Templates to correct the setting and export the security file.
Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.
Use Secedit /RefreshPolicy Machine_Policy command.
Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.
第12题:
Attack Pretection,Reconnaissance,Security Policy,Informational
Attack Pretection,Scan,Security Policy,Informational
Attack Pretection,Reconnaissance,Misuser&Abuse,Informational
Attack Pretectio,Scan,Security Policy,Misuser&Abuse
第13题:
Which three statements are true regarding IDP?()
第14题:
BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate whatclassification of attack?()
第15题:
When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()
第16题:
What are three configuration objects used to build JUNOS IDP rules?()
第17题:
What is the function of Host Checker?()
第18题:
You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()
第19题:
Sniffing attack
Denial of service attack
Port Scan attack
Reconnaisance attack
Spoofing attack
第20题:
Use secedit.exe to refresh the security policy.
Use the local computer policy to configure the local security policy.
Use security configuration and analysis to support the security files as a .pol file.
Use computer management to configure the security policy setting.
第21题:
The implicit default security policy permits all traffic.
Traffic destined to the device itself always requires a security policy.
Traffic destined to the device’s incoming interface does not require a security policy.
The factory-default configuration permits all traffic from all interfaces.
第22题:
Phishing
Vishing
DDoS
Xmas attack
第23题:
Reset the SrvAcct password,
Configure the default Domain Controllers policy to assign the SrvAcct account the right to log on locally.
Unlock the SrvAcct account.
Restart the NetAppService service.
第24题:
Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the domain
Log on to each server and run Security Configuration and Analysis to analyze the security settings by using a custom security template
Create a logon script to run the secedit command to analyze all servers in the domain
Run the Microsoft Baseline Security Analyzer (MBSA) on a server to scan for Windows vulnerabilities on all servers in the domain