参考答案和解析
正确答案: C
解析: 暂无解析
更多“单选题Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()A Update antivirus definitionsB MAC filteringC Effective security policiesD User awareness training”相关问题
  • 第1题:

    Which of the following is NOT true of security attacks?

    [A] Employees will keep up with security polices and awareness if they are highly-trained.

    [B] The rate of security attacks appears faster than the growth of the Internet.

    [C] One's computer system will never be secure.

    [D] Vulnerabilities can go through phones, wireless devices, and network appliances


    正确答案:A
    依据是"Employees will never keep up with security polices and awareness. It doesn't matter how much you train and educate your employees.

  • 第2题:

    A user states that their work PC has become infected with a virus. Which of the following shouldthe technician do FIRST?()

    • A、Perform an antivirus program scan
    • B、Boot the machine into Safe Mode
    • C、Remove the machine from the network
    • D、Check for system security patches

    正确答案:C

  • 第3题:

    Which of the following is the MOST important consideration when implementing a data retentio program?()

    • A、 The data destruction requirements
    • B、 The user awareness training program
    • C、 The laws and legal requirements of the data
    • D、 The companys individual data retention policies

    正确答案:C

  • 第4题:

    Which command do you use to display the status of an antivirus database update?()

    • A、show security utm anti-virus status
    • B、show security anti-virus database status
    • C、show security utm anti-virus database
    • D、show security utm anti-virus update

    正确答案:A

  • 第5题:

    You are responsible for increasing the security within the Company LAN. Of the following choices  listed below,  which is true regarding layer 2 security and mitigation techniques? ()

    • A、 Enable root guard to mitigate ARP address spoofing attacks.
    • B、 Configure DHCP spoofing to mitigate ARP address spoofing attacks.
    • C、 Configure PVLANs to mitigate MAC address flooding attacks.
    • D、 Enable root guard to mitigate DHCP spoofing attacks.
    • E、 Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted  ports.
    • F、 Configure port security to mitigate MAC address flooding  
    • G、 None of the other alternatives apply

    正确答案:F

  • 第6题:

    Which of the following security threats are MOST likely prevented through user training?()

    • A、Network Intrusion
    • B、Adware Popups
    • C、Social Engineering
    • D、Spam Messages

    正确答案:C

  • 第7题:

    Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()

    • A、Honeynet
    • B、Honeypot
    • C、Vulnerability scanner
    • D、Network based IDS

    正确答案:A

  • 第8题:

    单选题
    Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()
    A

    Update antivirus definitions

    B

    MAC filtering

    C

    Effective security policies

    D

    User awareness training


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following security threats are MOST likely prevented through user training?()
    A

    Network Intrusion

    B

    Adware Popups

    C

    Social Engineering

    D

    Spam Messages


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()
    A

    A public place where guests are free to access the wireless network.

    B

    A small office where a defined number of specific wireless devices are used.

    C

    A meeting room where various company users will access the wireless network during meetings. 

    D

    An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following is the MOST important consideration when implementing a data retentio program?()
    A

     The data destruction requirements

    B

     The user awareness training program

    C

     The laws and legal requirements of the data

    D

     The companys individual data retention policies


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    You are responsible for increasing the security within the Company LAN. Of the following choices  listed below,  which is true regarding layer 2 security and mitigation techniques? ()
    A

     Enable root guard to mitigate ARP address spoofing attacks.

    B

     Configure DHCP spoofing to mitigate ARP address spoofing attacks.

    C

     Configure PVLANs to mitigate MAC address flooding attacks.

    D

     Enable root guard to mitigate DHCP spoofing attacks.

    E

     Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted  ports.

    F

     Configure port security to mitigate MAC address flooding  

    G

     None of the other alternatives apply


    正确答案: C
    解析: 暂无解析

  • 第13题:

    The Company is concerned about Layer 2 security threats.  Which statement is true about these  threats? ()

    • A、 MAC spoofing attacks allow an attacking device to receive frames intended for a different  network host.
    • B、 Port scanners are the most effective defense against dynamic ARP inspection.
    • C、 MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable  attack points.
    • D、 Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP  snooping attacks.
    • E、 DHCP snooping sends unauthorized replies to DHCP queries.
    • F、 ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.
    • G、 None of the other alternatives apply.

    正确答案:A

  • 第14题:

    In which of the following scenarios would MAC filtering be MOST effective as a part of wireless security? ()

    • A、A public place where guests are free to access the wireless network.
    • B、A small office where a defined number of specific wireless devices are used.
    • C、A meeting room where various company users will access the wireless network during meetings. 
    • D、An office where some users are unable to use WPA encryption due to older wireless cards so they use MAC filtering.

    正确答案:B

  • 第15题:

    Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()

    • A、Update antivirus definitions
    • B、MAC filtering
    • C、Effective security policies
    • D、User awareness training

    正确答案:D

  • 第16题:

    Which of these user ICAP?()

    • A、 anti-malware scanning
    • B、 data loss prevention polices
    • C、 decryption policies
    • D、 CiscoIronPort Data Security policies

    正确答案:B

  • 第17题:

    A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()

    • A、WEP
    • B、Port filtering
    • C、WPA
    • D、Longer SSID broadcast intervals

    正确答案:C

  • 第18题:

    Which of the following wireless security techniques is the MOST secure?()

    • A、Enable Wired Equivalent Privacy
    • B、Disable SSID broadcast
    • C、Enable Wi-Fi Protected Access
    • D、Enable MAC filtering

    正确答案:C

  • 第19题:

    单选题
    A user states that their work PC has become infected with a virus. Which of the following shouldthe technician do FIRST?()
    A

    Perform an antivirus program scan

    B

    Boot the machine into Safe Mode

    C

    Remove the machine from the network

    D

    Check for system security patches


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    The Company is concerned about Layer 2 security threats.  Which statement is true about these  threats? ()
    A

     MAC spoofing attacks allow an attacking device to receive frames intended for a different  network host.

    B

     Port scanners are the most effective defense against dynamic ARP inspection.

    C

     MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable  attack points.

    D

     Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP  snooping attacks.

    E

     DHCP snooping sends unauthorized replies to DHCP queries.

    F

     ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.

    G

     None of the other alternatives apply.


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
    A

    Honeynet

    B

    Honeypot

    C

    Vulnerability scanner

    D

    Network based IDS


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    Which command do you use to display the status of an antivirus database update?()
    A

    show security utm anti-virus status

    B

    show security anti-virus database status

    C

    show security utm anti-virus database

    D

    show security utm anti-virus update


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following wireless security techniques is the MOST secure?()
    A

    Enable Wired Equivalent Privacy

    B

    Disable SSID broadcast

    C

    Enable Wi-Fi Protected Access

    D

    Enable MAC filtering


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    Which of these user ICAP?()
    A

     anti-malware scanning

    B

     data loss prevention polices

    C

     decryption policies

    D

     CiscoIronPort Data Security policies


    正确答案: B
    解析: 暂无解析