A.Performing end-user training on the use of antispyware software
B.Performing virus scans
C.Scanning a network for active IP addresses and open ports on those IP addresses
D.Using password-cracking utilities
您可能感興趣的試卷
你可能感興趣的試題
A.Top-secret
B.Confidential
C.SBU
D.Secret
A.Host-based IPS can work in promiscuous mode or inline mode.
B.Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.
C.Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows.
D.Host-based IPS deployment requires less planning than network-based IPS.
A.HMAC
B.RSA
C.MD5
D.SHA-1
A.MD65
B.SHA-135
C.XR12
D.MD5
A.Ciphertext
B.Salt
C.Cryptotext
D.Rainbow table
最新試題
Which type of intrusion prevention technology will be primarily used by the Cisco IPS security appliances?()
Which option ensures that data is not modified in transit?()
Which name is of the e-mail traffic monitoring service that underlies that architecture of IronPort?()
How do you define the authentication method that will be used with AAA?()
Refer to the exhibit. Based on the VPN connection shown, which statement is true?()
On the basis of the show policy-map type inspect zone-pair session command output provided in theexhibit.What can be determined about this Cisco IOS zone based firewall policy?()
Refer to the exhibit. Which statement is correct based on the show login command output shown?()
What are two characteristics of the SDM Security Audit wizard?()
For the following options, which feature is the foundation of Cisco Self-Defending Network technology?()
During role-based CLI configuration, what must be enabled before any user views can be created?()