Update antivirus definitions
MAC filtering
Effective security policies
User awareness training
第1题:
Which of the following is NOT true of security attacks?
[A] Employees will keep up with security polices and awareness if they are highly-trained.
[B] The rate of security attacks appears faster than the growth of the Internet.
[C] One's computer system will never be secure.
[D] Vulnerabilities can go through phones, wireless devices, and network appliances
第2题:
A user states that their work PC has become infected with a virus. Which of the following shouldthe technician do FIRST?()
第3题:
Which of the following is the MOST important consideration when implementing a data retentio program?()
第4题:
Which command do you use to display the status of an antivirus database update?()
第5题:
You are responsible for increasing the security within the Company LAN. Of the following choices listed below, which is true regarding layer 2 security and mitigation techniques? ()
第6题:
Which of the following security threats are MOST likely prevented through user training?()
第7题:
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
第8题:
Update antivirus definitions
MAC filtering
Effective security policies
User awareness training
第9题:
Network Intrusion
Adware Popups
Social Engineering
Spam Messages
第10题:
A public place where guests are free to access the wireless network.
A small office where a defined number of specific wireless devices are used.
A meeting room where various company users will access the wireless network during meetings.
An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.
第11题:
The data destruction requirements
The user awareness training program
The laws and legal requirements of the data
The companys individual data retention policies
第12题:
Enable root guard to mitigate ARP address spoofing attacks.
Configure DHCP spoofing to mitigate ARP address spoofing attacks.
Configure PVLANs to mitigate MAC address flooding attacks.
Enable root guard to mitigate DHCP spoofing attacks.
Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted ports.
Configure port security to mitigate MAC address flooding
None of the other alternatives apply
第13题:
The Company is concerned about Layer 2 security threats. Which statement is true about these threats? ()
第14题:
In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()
第15题:
Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()
第16题:
Which of these user ICAP?()
第17题:
A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()
第18题:
Which of the following wireless security techniques is the MOST secure?()
第19题:
Perform an antivirus program scan
Boot the machine into Safe Mode
Remove the machine from the network
Check for system security patches
第20题:
MAC spoofing attacks allow an attacking device to receive frames intended for a different network host.
Port scanners are the most effective defense against dynamic ARP inspection.
MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable attack points.
Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP snooping attacks.
DHCP snooping sends unauthorized replies to DHCP queries.
ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.
None of the other alternatives apply.
第21题:
Honeynet
Honeypot
Vulnerability scanner
Network based IDS
第22题:
show security utm anti-virus status
show security anti-virus database status
show security utm anti-virus database
show security utm anti-virus update
第23题:
Enable Wired Equivalent Privacy
Disable SSID broadcast
Enable Wi-Fi Protected Access
Enable MAC filtering
第24题:
anti-malware scanning
data loss prevention polices
decryption policies
CiscoIronPort Data Security policies