网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which of the following web browser features deters users from visiting spoofed sites?()

  • A、Anti-malware detection
  • B、Anti-phishing filters
  • C、Anti-spyware filters
  • D、Antivirus engines

参考答案

更多 “Which of the following web browser features deters users from visiting spoofed sites?()A、Anti-malware detectionB、Anti-phishing filtersC、Anti-spyware filtersD、Antivirus engines” 相关考题
考题 WWW is popular for its multimedia transmission and friendly(71). Although the speed of network has been improved considerably in recent years, the rapid(72)of using the Internet, the inherited character of delay in the network and the Request/Response working mode of WWW still make the Internet traffic very(73)and give no guarantee on the Quality of Service. Because HTTP has no states, the web server cannot know the users' demand and the users' requests cannot be predicted Taking advantage of a cache mechanism and the time locality of WWW accesses, the browser can preserve the documents ever accessed in the local machine. By this means, for the documents in the local cache, the browser does not need to send the requests to the remote server or to receive the whole responses from the remote one Pre-fetching uses the space locality of accesses First, the users' access requests are predicted according to the users' current request. Secondly, the expected pages are fetched into the local cache when the user is brow sing the current page. Finally, the users can access these pages downloaded from the local cache. And this can reduce the access delay to some degrees. Pre-fetching is one kind of active caches that can cache the pages which are still not requested by the user. The application of pre-fetching technology in the web can greatly reduce the waiting time after users have sent their requests. This paper brings forward an intelligent technique of web pre-fetching, which can speed up fetching web pages. In this technique, we use a simplified WWW data model to represent the data in the cache of web browser to mine the association rules. We store these rules in a knowledge base so as to(74)the user's actions. In the client sides, the agents are responsible for mining the users' interest and pre-fetching the web pages, which are based on the interest association repository. Therefore it is(75)for the users to speed up the browsing.A.interactiveB.interactionC.interactivityD.infection

考题 Which two UTM features require a license to be activated? ()(Choose two.) A. antispamB. antivirus (full AV)C. content filteringD. Web-filtering redirect

考题 Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()A. net viewB. ipconfigC. digD. ifconfig

考题 Examine the following items, which one offers a variety of security solutions, including firewall, IPS, VPN,antispyware, antivirus, and antiphishing features?()A、Cisco IOS routerB、Cisco PIX 500 series security applianceC、Cisco 4200 series IPS applianceD、Cisco ASA 5500 series security appliance

考题 Which three of the following are valid CRS deployment scenarios? ()A、High Availability CRS Engines running on hardware from different server classes B、High Availability CRS Engines running on similar hardware from the same server class but from different vendors C、High Availability CRS Engines and database and a simplex Recording Server D、High Availability CRS Engines and four simplex VoIP Monitoring Servers E、CCM co-resident deployment on an MCS 7815

考题 Which of the following features would hide internal IP addresses from the Internet?()A、Network Address TranslationB、Port forwardingC、Quality of ServiceD、SSID broadcast

考题 Which of the following steps does a customer use to upgrade the firmware on the AMM to the latest level?()A、Open a Web browser and log on to the IMM; in the navigation frame, click IMM Firmware Update under IMM Control; click Browse; select the .exe file; click the Upgrade/Update button B、TFTP to the AMM; from the Main Menu, select Update; browse to the downloaded .exe file C、Telnet to AMM; from the Main Menu, select Update; browse to the downloaded .pkt file D、Open a Web browser and log on to the AMM; in the navigation frame, click AMM Firmware Update under AMM Control; click Browse; select the .pkt file; click the Upgrade/Update button

考题 A web browser need NOT always perform a complete request for a particular page that it suspects mightNOT have changed. The HTTP specification provides a mechanism for the browser to retrieve only a partialresponse from the web server; this response includes information, such as the Last-Modified date but NOTthe body of the page. Which HTTP method will the browser use to retrieve such a partial response?()A、GETB、ASKC、SENDD、HEADE、TRACE

考题 A user opens a webpage that requires the transmission of packets from the Web server to the client's browser. The packets transmitted from the Web server to the client exceed the smallest MTU value on the communications path. Which two protocol functions allow this type of communication?()A、packet segmentationB、serialized checkingC、packet sequencingD、parallel checking

考题 ()are web sites that search the web for occurrences of a specified word or phrase.A、InternetB、WWWC、JavaD、Search engines

考题 In the wireless Advanced Feature Set using lightweight access points, a virtual interface is used when supporting which of the following features?()A、PSK authenticationB、EAP authenticationC、WPA authenticationD、Web authentication

考题 A virus has been removed from the user’s machine, but the user still cannot access the Internet.Which of the following should the technician check NEXT?()A、Disable port forwarding on the router.B、Reboot to Safe Mode and see if the Internet is accessible.C、Format the machine and reinstall the OS.D、Check the web browser’s proxy settings.

考题 A company has a corporate office building that is used by 50 to 100 unique visitors each day for meetings. Users routinely report that they are unable to access the network with their laptops when visiting this location. The help desk reports that these users are not getting IP addresses automatically assigned. After an investigation, the server administrator has determined that the DHCP service is functioning, but a minimal number of addresses are available for lease. The building is on its own class Csubnet and has 250 addresses in the scope.  Which of the following represents a long term solution tothe problem?()A、 Manually delete address leases from DHCP.B、 Create reservations in DHCP for users frequently visiting this location.C、 Assign static IP addresses to visiting laptops.D、 Reduce the lease duration in the DHCP scope options to one day.

考题 Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()A、Intrusion detectionB、VirtualizationC、KitingD、Cloning

考题 Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()A、net viewB、ipconfigC、digD、ifconfig

考题 Which of the following features sets IBM apart from competitors in the area of partitioning?()A、Software supportB、Hardware isolationC、Static changes in partitionsD、Micro-Partitioning

考题 A customer wants to have employees work from remote locations as well as in the office.  All communications must be secure and files must be protected from access by unauthorized people.  The employee’s applications (database inserts and reads) are only accessed with a web browser.  Which of the following capabilities is necessary?()A、SSLB、PGPC、File encryption programD、Public key encryption

考题 You are creating a web form with this HTML: 11. 12. 13. 14. 15. Which HTTP method is used when sending this request from the browser?()A、GETB、PUTC、POSTD、SENDE、FORM

考题 Which two UTM features require a license to be activated? ()(Choose two.)A、antispamB、antivirus (full AV)C、content filteringD、Web-filtering redirect

考题 Your network contains a stand-alone certification authority (CA) and a Web server. The Web server hosts a secure Web site. The Web site uses a server certificate that was issued from the CA. Users report that they receive a certificate warning message when they connect to the Web site. You need to prevent users from receiving the certificate warning message when they connect to the Web site. What should you do from the Internet Options in Internet Explorer?() A、Import the CA certificate to the trusted root CA certificate store. B、Import the server authentication certificate to the trusted publishers certificate store.C、Clear the Check for publisher's certificate revocation check box. D、Clear the Require server verification (https:) for all sites in this zone check box for the Trusted sites zone.

考题 Your network contains a Web server named Server1 that runs Windows Server 2003 and Internet Information Server (IIS). Server1 has a server certificate from an Enterprise Certificate Authority (CA) installed. External users report that when they try to access the Web site from outside the corporate network by using a Web browser, they receive the following warning message: There is a problem with this Web sites security certificate. The security certificate presented by this Web site was not issued by a trusted certificate authority. You find that users onthe corporate network do not receive this error. You need to ensure that external users do not receive the warning message when connecting to Server1.   What should you do?()A、In IIS Manager, enable the Enable client certificate mapping option.B、In IIS Manager, replace the certificate with a certificate obtained from a public Certification Authority.C、In Local Security Policy, enable Domain Member: Require strong (Windows 2000 or later) session key.D、In Local Security Policy, enable Domain Member: Digitally encrypt or sign secure channel data (always).

考题 单选题Which of the following web browser features deters users from visiting spoofed sites?()A Anti-malware detectionB Anti-phishing filtersC Anti-spyware filtersD Antivirus engines

考题 单选题You are creating a web form with this HTML: 11. 12. 13. 14. 15. Which HTTP method is used when sending this request from the browser?()A GETB PUTC POSTD SENDE FORM

考题 单选题Which of the following statements is true according to the passage?A The address system was used to make web pages.B The World Wide Web was created in Switzerland.C The fist web browser was very expensive to buyD Many people could use the Internet before 1990

考题 单选题Your network contains a Web server named Server1 that runs Windows Server 2003 and Internet Information Server (IIS). Server1 has a server certificate from an Enterprise Certificate Authority (CA) installed. External users report that when they try to access the Web site from outside the corporate network by using a Web browser, they receive the following warning message: There is a problem with this Web sites security certificate. The security certificate presented by this Web site was not issued by a trusted certificate authority. You find that users onthe corporate network do not receive this error. You need to ensure that external users do not receive the warning message when connecting to Server1.   What should you do?()A In IIS Manager, enable the Enable client certificate mapping option.B In IIS Manager, replace the certificate with a certificate obtained from a public Certification Authority.C In Local Security Policy, enable Domain Member: Require strong (Windows 2000 or later) session key.D In Local Security Policy, enable Domain Member: Digitally encrypt or sign secure channel data (always).

考题 多选题Which three of the following are valid CRS deployment scenarios? ()AHigh Availability CRS Engines running on hardware from different server classesBHigh Availability CRS Engines running on similar hardware from the same server class but from different vendorsCHigh Availability CRS Engines and database and a simplex Recording ServerDHigh Availability CRS Engines and four simplex VoIP Monitoring ServersECCM co-resident deployment on an MCS 7815

考题 单选题Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address.  Which of the following tools would allow the administrator to test name resolution?()A  net viewB  ipconfigC  digD  ifconfig