网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

●The (75)is designed specifically as a security system for preventing unauthorized communications between one computer network and another computer network.

(75)A.firewall

B.protocol

C.hacker

D.virus


参考答案

更多 “ ●The (75)is designed specifically as a security system for preventing unauthorized communications between one computer network and another computer network.(75)A.firewallB.protocolC.hackerD.virus ” 相关考题
考题 TCP(Transmission Control Protocol) was specifically designed to provide a reliable end-to-end byte stream over a(n)A.IP addressB.reliable networkC.socketD.unreliable internetwork

考题 Virus Security Software is designed to detect, eliminate or quarantine computer viruses before they are able to harm a computer or server networked system.A.AntiB.InvadeC.InroadD.Aggression

考题 The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?A.To prevent unauthorized hosts from getting access to the LANB.To limit the number of Layer 2 broadcasts on a particular switch portC.To prevent unauthorized Telnet or SSH access to a switch portD.To prevent the IP and MAC address of the switch and associated portsE.None of the above

考题 A firewall is a security system designed to(62) an organization's network against(63).A.preventB.protectC.developD.exploit

考题 TCP(Transmission Control Protocol)was specifically designed to provide a reliable end-to-end byte stream over a(n)(70).A.IP addressB.reliable networkC.socketD.unreliable internetwork

考题 Transverse frames are more widely spaced on a ship that is designed with the ______.A.Centerline system of framingB.Isometric system of framingC.Longitudinal system of framingD.Transverse system of framing

考题 Without proper safeguards,every part of a network is vulnerable to a security breach or unauthorized activity from(71),competitors,or even employees.Many of the organizations that manage their own(72)network security and use the Internet for more than just sending/receiving e-mails experience a network(73)—and more than half of these companies do not even know they were attacked.Smaller(74)are often complacent,having gained a false sense of security.They usually react to the last virus or the most recent defacing of their website.But they are trapped in a situation where they do not have the necessary time and(75)to spend on security. A.exterior B.internal C.centre D.middle

考题 The other distinguishing trait of the law( ) A.punishment is carried out by the courts at all levels B.rules and court practices initiated by a governmental agency are specifically designed to increase government control C.a system of rules governing a conduct,activity or event incidental by nature D.any governmental reinforcement

考题 Why would a network administrator configure port security on a switch?()A、to prevent unauthorized Telnet access to a switch portB、to limit the number of Layer 2 broadcasts on a particular switch portC、to prevent unauthorized hosts from accessing the LAND、to protect the IP and MAC address of the switch and associated portsE、to block unauthorized access to the switch management interfaces over common TCP ports

考题 Which of the following expansion card slots was designed specifically for video cards?()A、 PCIeB、 ISAC、 AGPD、 PCIx

考题 What are two uses of NAT?()A、conserving public IP addressesB、allowing stateful packet inspectionC、preventing unauthorized connections from outside the networkD、allowing networks with overlapping private address space to communicate

考题 Which statements describe two of the benefits of VLAN Trunking Protocol?()A、VTP allows routing between VLANs.B、VTP allows a single switch port to carry information to more than one VLAN.C、VTP allows physically redundant links while preventing switching loops.D、VTP simplifies switch administration by allowing switches to automatically share VLAN configuration information.E、VTP helps to limit configuration errors by keeping VLAN naming consistent across the VTP domain.F、VTP enhances security by preventing unauthorized hosts from connecting to the VTP domain.

考题 Which cisco security product line uses deep inspection to identify and prevent malicious attacks,resource misuse, and unauthorized access?()A、MARSB、NACC、VPND、IPS

考题 An administrator is troubleshooting issues on an application server.After a root cause analysis,the administrator has determined that there were some unauthorized logins to the server.Which of the following locations would BEST help to determine details about the unauthorized logins?()A、Active DirectoryB、DHCP logsC、Security logsD、System logs

考题 Which of the following technologies is specifically designed to increase server virtualization performance?()A、 Multicore processingB、 VTC、 64-bit processingD、 Hyperthreading

考题 Which of the following would be used to monitor unauthorized access to data files?()A、Performance Log and AlertsB、Event ViewerC、Security Configuration and AnalysisD、IP Security Monitor

考题 Which two are uses of NAT?()A、enabling network migrationsB、conserving public IP addressesC、allowing stateful packet inspectionD、preventing unauthorized connections from outside the network

考题 单选题Which of the following expansion card slots was designed specifically for video cards?()A  PCIeB  ISAC  AGPD  PCIx

考题 填空题Besides preventing burglary, the added bonus of investing alarm systems is that home-security company will offer you a discount.____

考题 单选题()means a plan developed to ensure the application of measures designed to protect the port facility and ships, persons, cargo, cargo transport units and ships stores within the port facility from the risks of a security incident.A Ship security planB Company security planC Port facility security planD National security plan

考题 单选题()means a plan developed to ensure the application of measures on board the ship designed to protect persons on board, cargo, cargo transport units, ship’s stores or the ship from the risks of a security incident.A Ship security planB Company security planC Port facility security planD National security plan

考题 单选题Which of the following technologies is specifically designed to increase server virtualization performance?()A  Multicore processingB  VTC  64-bit processingD  Hyperthreading

考题 单选题Why would a network administrator configure port security on a switch()。A to prevent unauthorized Telnet access to a switch portB to limit the number of Layer 2 broadcasts on a particular switch portC to prevent unauthorized hosts from accessing the LAND to protect the IP and MAC address of the switch and associated portsE to block unauthorized access to the switch management interfaces over common TCP ports

考题 多选题Which statements describe two of the benefits of VLAN Trunking Protocol?()AVTP allows routing between VLANs.BVTP allows a single switch port to carry information to more than one VLAN.CVTP allows physically redundant links while preventing switching loops.DVTP simplifies switch administration by allowing switches to automatically share VLAN configuration information.EVTP helps to limit configuration errors by keeping VLAN naming consistent across the VTP domain.FVTP enhances security by preventing unauthorized hosts from connecting to the VTP domain.

考题 单选题Turbocharging system may be designed to operate on either the () or the constant pressure exhaust system.A pulseB exhaustC fluctuatingD hunting

考题 单选题Transverse frames are more widely spaced on a ship that is designed with the().A centerline system of framingB isometric system of framingC longitudinal system of framingD transverse system of framing

考题 单选题A high cube container is designed specifically to().A carry low density cargoesB protect fragile cargoesC stow cargoes with concentrated weights such as machineryD carry cargoes of very low stowage factors