Intrusion detection
Virtualization
Kiting
Cloning
第1题:
Which of the following constraint types can be used to ensure the value of an INTEGER column references only positive values?()
第2题:
Which of the following technologies can be used to remotely gain access to a server console?()
第3题:
A.Intrusiondetection
B.Virtualization
C.Kiting
D.Cloning
第4题:
Which of the following cable types can be used to decrease susceptibility to electronic eavesdropping?()
第5题:
Which of the following switches in Windows can be used to ping a host until stopped?()
第6题:
Which of the following management types can be used to deploy appropriate quality-of-servicesolutions to make the most efficient use of bandwidth?()
第7题:
When a user’s computer is first turned on, they see a lock symbol and a blinking cursor. Which of the following was configured in the BIOS to show this?()
第8题:
A.Unique
B.Check
C.Referential
D.Informational
第9题:
An administrator has been having problems with server security. Many of the servers have been infected with viruses in the past. Which of the following can be done to ensure that systems avoid OS exploits? ()
第10题:
Which of the following can be used when installing the OS without a boot disk?()