多項(xiàng)選擇題What are two steps that must be taken when mitigating a worm attack?()

A.Inoculate systems by applying update patches. 
B.Limit traffic rate. 
C.Apply authentication. 
D.Quarantine infected machines. 
E.Enable anti-spoof measures.


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題When configuring the Cisco VPN Client,what action is required prior to installing Mutual Group Authentication?()

A.Transparent tunneling must be enabled.
B.A valid root certificate must be installed.
C.A group pre-shared secret must be properly configured.
D.The option to "Allow Local LAN Access" must be selected.

2.單項(xiàng)選擇題During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()

A.mode configuration
B.the VPN client establishment of an ISAKMP SA
C.IPsec quick mode completion of the connection
D.VPN client initiation of the IKE phase 1 process

3.多項(xiàng)選擇題Which three categories of signatures can a Cisco IPS microengine identify?()

A.DDoS signatures
B.strong signatures
C.exploit signatures
D.numeric signatures
E.spoofing signatures
F.connection signatures

4.單項(xiàng)選擇題Which statement about an IPS is true?()

A.The IPS is in the traffic path.
B.Only one active interface is required.
C.Full benefit of an IPS will not be realized unless deployed in conjunction with an IDS.
D.When malicious traffic is detected,the IPS will only send an alert to a management station.

5.多項(xiàng)選擇題Which two statements about an IDS are true?()

A.The IDS is in the traffic path.
B.The IDS can send TCP resets to the source device.
C.The IDS can send TCP resets to the destination device.
D.The IDS listens promiscuously to all traffic on the network.
E.Default operation is for the IDS to discard malicious traffic.

最新試題

What are two steps that must be taken when mitigating a worm attack?()

題型:多項(xiàng)選擇題

Which three techniques should be used to secure management protocols?()

題型:多項(xiàng)選擇題

Which statement describes the Authentication Proxy feature?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit.Which three statements describe the steps that are required to configure an IPsec site-to-site VPN using a GRE tunnel?()

題型:多項(xiàng)選擇題

Which statement describes Reverse Route Injection (RRI)?()

題型:?jiǎn)雾?xiàng)選擇題

Which three MPLS statements are true?()

題型:多項(xiàng)選擇題

During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit.What does the "26" in the first two hop outputs indicate?()

題型:?jiǎn)雾?xiàng)選擇題

Which two statements are true about broadband cable (HFC) systems?()

題型:多項(xiàng)選擇題

Refer to the exhibit. Which order correctly identifies the steps to provision a cable modem to connect to a headend as defined by the DOCSIS standard?()

題型:?jiǎn)雾?xiàng)選擇題