A.Performing end-user training on the use of antispyware software
B.Performing virus scans
C.Scanning a network for active IP addresses and open ports on those IP addresses
D.Using password-cracking utilities
您可能感興趣的試卷
你可能感興趣的試題
A.Top-secret
B.Confidential
C.SBU
D.Secret
A.Host-based IPS can work in promiscuous mode or inline mode.
B.Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.
C.Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows.
D.Host-based IPS deployment requires less planning than network-based IPS.
A.HMAC
B.RSA
C.MD5
D.SHA-1
A.MD65
B.SHA-135
C.XR12
D.MD5
A.Ciphertext
B.Salt
C.Cryptotext
D.Rainbow table
最新試題
As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()
What will be disabled as a result of the no service password-recovery command?()
In an IEEE 802.1x deployment,between which two devices EAPOL messages typically are sent?()
Which two primary port authentication protocols are used with VSANs?()
Which one of the aaa accounting commands can be used to enable logging of both the start and stoprecords for user terminal sessions on the router?()
What is the objective of Diffie-Hellman?()
Refer to the exhibit. Which statement is correct based on the show login command output shown?()
Which type of MAC address is dynamically learned by a switch port and then added to the switch’s runningconfiguration?()
What are two characteristics of the SDM Security Audit wizard?()
Refer to the exhibit. You are the network security administrator responsible for router security.Your networkuses internal IP addressing according to RFC 1918 specifications.From the default rules shown,whichaccess control list would prevent IP address spoofing of these internal networks?()