网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
●The (75)is designed specifically as a security system for preventing unauthorized communications between one computer network and another computer network.
(75)A.firewall
B.protocol
C.hacker
D.virus
参考答案
更多 “ ●The (75)is designed specifically as a security system for preventing unauthorized communications between one computer network and another computer network.(75)A.firewallB.protocolC.hackerD.virus ” 相关考题
考题
TCP(Transmission Control Protocol) was specifically designed to provide a reliable end-to-end byte stream over a(n)A.IP addressB.reliable networkC.socketD.unreliable internetwork
考题
Virus Security Software is designed to detect, eliminate or quarantine computer viruses before they are able to harm a computer or server networked system.A.AntiB.InvadeC.InroadD.Aggression
考题
The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?A.To prevent unauthorized hosts from getting access to the LANB.To limit the number of Layer 2 broadcasts on a particular switch portC.To prevent unauthorized Telnet or SSH access to a switch portD.To prevent the IP and MAC address of the switch and associated portsE.None of the above
考题
A firewall is a security system designed to(62) an organization's network against(63).A.preventB.protectC.developD.exploit
考题
TCP(Transmission Control Protocol)was specifically designed to provide a reliable end-to-end byte stream over a(n)(70).A.IP addressB.reliable networkC.socketD.unreliable internetwork
考题
Transverse frames are more widely spaced on a ship that is designed with the ______.A.Centerline system of framingB.Isometric system of framingC.Longitudinal system of framingD.Transverse system of framing
考题
Without proper safeguards,every part of a network is vulnerable to a security breach or unauthorized activity from(71),competitors,or even employees.Many of the organizations that manage their own(72)network security and use the Internet for more than just sending/receiving e-mails experience a network(73)—and more than half of these companies do not even know they were attacked.Smaller(74)are often complacent,having gained a false sense of security.They usually react to the last virus or the most recent defacing of their website.But they are trapped in a situation where they do not have the necessary time and(75)to spend on security.
A.exterior
B.internal
C.centre
D.middle
考题
The other distinguishing trait of the law( ) A.punishment is carried out by the courts at all levels
B.rules and court practices initiated by a governmental agency are specifically designed to increase government control
C.a system of rules governing a conduct,activity or event incidental by nature
D.any governmental reinforcement
考题
Why would a network administrator configure port security on a switch?()A、to prevent unauthorized Telnet access to a switch portB、to limit the number of Layer 2 broadcasts on a particular switch portC、to prevent unauthorized hosts from accessing the LAND、to protect the IP and MAC address of the switch and associated portsE、to block unauthorized access to the switch management interfaces over common TCP ports
考题
Which of the following expansion card slots was designed specifically for video cards?()A、 PCIeB、 ISAC、 AGPD、 PCIx
考题
What are two uses of NAT?()A、conserving public IP addressesB、allowing stateful packet inspectionC、preventing unauthorized connections from outside the networkD、allowing networks with overlapping private address space to communicate
考题
Which statements describe two of the benefits of VLAN Trunking Protocol?()A、VTP allows routing between VLANs.B、VTP allows a single switch port to carry information to more than one VLAN.C、VTP allows physically redundant links while preventing switching loops.D、VTP simplifies switch administration by allowing switches to automatically share VLAN configuration information.E、VTP helps to limit configuration errors by keeping VLAN naming consistent across the VTP domain.F、VTP enhances security by preventing unauthorized hosts from connecting to the VTP domain.
考题
Which cisco security product line uses deep inspection to identify and prevent malicious attacks,resource misuse, and unauthorized access?()A、MARSB、NACC、VPND、IPS
考题
An administrator is troubleshooting issues on an application server.After a root cause analysis,the administrator has determined that there were some unauthorized logins to the server.Which of the following locations would BEST help to determine details about the unauthorized logins?()A、Active DirectoryB、DHCP logsC、Security logsD、System logs
考题
Which of the following technologies is specifically designed to increase server virtualization performance?()A、 Multicore processingB、 VTC、 64-bit processingD、 Hyperthreading
考题
Which of the following would be used to monitor unauthorized access to data files?()A、Performance Log and AlertsB、Event ViewerC、Security Configuration and AnalysisD、IP Security Monitor
考题
Which two are uses of NAT?()A、enabling network migrationsB、conserving public IP addressesC、allowing stateful packet inspectionD、preventing unauthorized connections from outside the network
考题
单选题Which of the following expansion card slots was designed specifically for video cards?()A
PCIeB
ISAC
AGPD
PCIx
考题
填空题Besides preventing burglary, the added bonus of investing alarm systems is that home-security company will offer you a discount.____
考题
单选题()means a plan developed to ensure the application of measures designed to protect the port facility and ships, persons, cargo, cargo transport units and ships stores within the port facility from the risks of a security incident.A
Ship security planB
Company security planC
Port facility security planD
National security plan
考题
单选题()means a plan developed to ensure the application of measures on board the ship designed to protect persons on board, cargo, cargo transport units, ship’s stores or the ship from the risks of a security incident.A
Ship security planB
Company security planC
Port facility security planD
National security plan
考题
单选题Which of the following technologies is specifically designed to increase server virtualization performance?()A
Multicore processingB
VTC
64-bit processingD
Hyperthreading
考题
单选题Why would a network administrator configure port security on a switch()。A
to prevent unauthorized Telnet access to a switch portB
to limit the number of Layer 2 broadcasts on a particular switch portC
to prevent unauthorized hosts from accessing the LAND
to protect the IP and MAC address of the switch and associated portsE
to block unauthorized access to the switch management interfaces over common TCP ports
考题
多选题Which statements describe two of the benefits of VLAN Trunking Protocol?()AVTP allows routing between VLANs.BVTP allows a single switch port to carry information to more than one VLAN.CVTP allows physically redundant links while preventing switching loops.DVTP simplifies switch administration by allowing switches to automatically share VLAN configuration information.EVTP helps to limit configuration errors by keeping VLAN naming consistent across the VTP domain.FVTP enhances security by preventing unauthorized hosts from connecting to the VTP domain.
考题
单选题Turbocharging system may be designed to operate on either the () or the constant pressure exhaust system.A
pulseB
exhaustC
fluctuatingD
hunting
考题
单选题Transverse frames are more widely spaced on a ship that is designed with the().A
centerline system of framingB
isometric system of framingC
longitudinal system of framingD
transverse system of framing
考题
单选题A high cube container is designed specifically to().A
carry low density cargoesB
protect fragile cargoesC
stow cargoes with concentrated weights such as machineryD
carry cargoes of very low stowage factors
热门标签
最新试卷