当前分类: BR0-001
问题:单选题Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()A Intrusion detectionB VirtualizationC KitingD Cloning...
查看答案
问题:单选题Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A The cell phone should require a password after a set period of inactivity.B The cel...
问题:单选题Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()A Protocol analyzerB Vulnerability scannerC Port scannerD Penetration test...
问题:单选题Which of the following requires an update to the baseline after installing new software on a machine?()A Signature-based NIPSB Signature-based NIDSC HoneypotD Behavior-based HIDS...
问题:单选题If a user attempts to go to a website and notices the URL has changed, which of the following attacks is MOST likely the cause?()A DLL injectionB DDoS attackC DNS poisoningD ARP poisoning...
问题:单选题Which of the following encryption methods is often used along with L2TP?()A S/MIMEB SSHC 3DESD IPSec...