CMS专题

单选题Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()A Update antivirus definitionsB MAC filteringC Effective security policiesD User awareness training

题目
单选题
Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()
A

Update antivirus definitions

B

MAC filtering

C

Effective security policies

D

User awareness training

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

113 Risk mitigation involves all but which of the following:

A. developing system standards (policies, procedure, responsibility standards)

B. obtaining insurance against loss

C. identification of project risks

D. performing contingent planning

E. developing planning alternatives


正确答案:C

第2题:

Which of the following is BEST for providing network security?()

A.Firewall

B.DMZ

C.Switch

D.IDS


参考答案:A

第3题:

Risk mitigation includes all but which of the following:

A Developing system (policies, procedures, responsibilities)

B Obtaining insurance against loss

C performing contingent planning

D developing planning alternatives

E identification of project risks.


正确答案:E

第4题:

Which of the following techniques is NOT used in the Grammar-Translation Method?

A.Reading
B.Translation
C.Written work
D.Oral presentation

答案:D
解析:
本题考查语法翻译法
D选项,语法翻译法重视阅读和翻译能力的培养,通过大量笔头翻译和写作练习来检测语法的掌握情况。综上,D选项正确。
A选项,阅读,与题意不符,故排除。
B选项,翻译,与题意不符,故排除。
C选项,书面作业,与题意不符,故排除。
故正确答案为 D项。

第5题:

Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?()

A. Disable TELNET

B. Disable IGMP snooping

C. Enable TELNET but not SSL

D. Disable ICMP/ping on device


参考答案:A

第6题:

166 Risk mitigation includes all but which of the following:

A. Developing system (policies, procedures, responsibilities)

B. Obtaining insurance against loss

C. performing contingent planning

D. developing planning alternatives

E. identification of project risks


正确答案:E

第7题:

Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()

A. Honeynet

B. Honeypot

C. Vulnerability scanner

D. Network based IDS


参考答案:A

第8题:

Risk mitigation involves all but which of the following:

A developing system standards (policies, procedure, responsibility standards)

B obtaining insurance against loss

C identification of project risks

D performing contingent planning

E developing planning alternatives


正确答案:C

第9题:

Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()

A.Update antivirus definitions

B.MAC filtering

C.Effective security policies

D.User awareness training


参考答案:D

第10题:

You are responsible for increasing the security within the Company LAN. Of the following choices  listed below,  which is true regarding layer 2 security and mitigation techniques? ()

  • A、 Enable root guard to mitigate ARP address spoofing attacks.
  • B、 Configure DHCP spoofing to mitigate ARP address spoofing attacks.
  • C、 Configure PVLANs to mitigate MAC address flooding attacks.
  • D、 Enable root guard to mitigate DHCP spoofing attacks.
  • E、 Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted  ports.
  • F、 Configure port security to mitigate MAC address flooding  
  • G、 None of the other alternatives apply

正确答案:F

更多相关问题