华为GB0-540

单选题TippingPoint IPS对应用保护的过滤器分为哪几类?()A Attack Pretection,Reconnaissance,Security Policy,InformationalB Attack Pretection,Scan,Security Policy,InformationalC Attack Pretection,Reconnaissance,Misuser&Abuse,InformationalD Attack Pretectio,Scan,Security Policy

题目
单选题
TippingPoint IPS对应用保护的过滤器分为哪几类?()
A

Attack Pretection,Reconnaissance,Security Policy,Informational

B

Attack Pretection,Scan,Security Policy,Informational

C

Attack Pretection,Reconnaissance,Misuser&Abuse,Informational

D

Attack Pretectio,Scan,Security Policy,Misuser&Abuse

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two configuration elements are required for a policy-based VPN?()

  • A、IKE gateway
  • B、secure tunnel interface
  • C、security policy to permit the IKE traffic
  • D、security policy referencing the IPsec VPN tunnel

正确答案:A,D

第2题:

Which statement describes the behavior of a security policy?()

  • A、The implicit default security policy permits all traffic.
  • B、Traffic destined to the device itself always requires a security policy.
  • C、Traffic destined to the device’s incoming interface does not require a security policy.
  • D、The factory-default configuration permits all traffic from all interfaces.

正确答案:C

第3题:

Which of the following security threats involves making phone calls?()

A.Phishing

B.Vishing

C.DDoS

D.Xmas attack


参考答案:B

第4题:

TippingPoint IPS对应用保护的过滤器分为哪几类?()

  • A、Attack Pretection,Reconnaissance,Security Policy,Informational
  • B、Attack Pretection,Scan,Security Policy,Informational
  • C、Attack Pretection,Reconnaissance,Misuser&Abuse,Informational
  • D、Attack Pretectio,Scan,Security Policy,Misuser&Abuse

正确答案:A

第5题:

过滤器的响应动作可以根据过滤器的保护类型进行配置,下列哪几类保护类型属于Application rotection?()

  • A、Attack Protection
  • B、Reconnaissance
  • C、Traffic Normalizations
  • D、Network Equipment Protection
  • E、Security Policy
  • F、Informational

正确答案:A,B,E,F

第6题:

You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()

  • A、Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer account
  • B、Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checks
  • C、Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security template
  • D、On the IIS server, run the gpresult command from a command prompt and analyze the output

正确答案:B

第7题:

Which three statements are true regarding IDP?()

  • A、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
  • B、IDP inspects traffic up to the Application layer.
  • C、IDP searches the data stream for specific attack patterns.
  • D、IDP inspects traffic up to the Presentation layer.
  • E、IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.

正确答案:B,C,E

第8题:

Which method is of gaining access to a system that bypasses normal security measures?()

  • A、Starting a Smurf attack
  • B、Conducting social engineering
  • C、Creating a back door
  • D、Launching a DoS attack

正确答案:C

第9题:

BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate whatclassification of attack?()

  • A、Sniffing attack
  • B、Denial of service attack
  • C、Port Scan attack
  • D、Reconnaisance attack
  • E、Spoofing attack

正确答案:E

第10题:

When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()

  • A、Third-party due diligence policy review
  • B、Remote Access Policy
  • C、Encryption Policy
  • D、Application change control policy
  • E、Security Personnel policy

正确答案:A,B,D

更多相关问题