移动端

  • 题王微信公众号

    微信搜“题王网”真题密题、最新资讯、考试攻略、轻松拿下考试

计算机考试 | CompTIA认证考试

模式切换

0 0 0
我的错题 我的收藏 学习笔记

章节目录

单选题 Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()

A

Protocol analyzer

B

Vulnerability scanner

C

Port scanner

D

Penetration test

单选题 Which of the following requires an update to the baseline after installing new software on a machine?()

A

Signature-based NIPS

B

Signature-based NIDS

C

Honeypot

D

Behavior-based HIDS

单选题 Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()

A

The cell phone should require a password after a set period of inactivity.

B

The cell phone should only be used for company related emails.

C

The cell phone data should be encrypted according to NIST standards.

D

The cell phone should have data connection abilities disabled.

单选题 Which of the following would an attacker use to footprint a system?()

A

RADIUS

B

Password cracker

C

Port scanner

D

Man-in-the-middle attack

单选题 Which of the following describes a static NAT?()

A

A static NAT uses a one to many mapping.

B

A static NAT uses a many to one mapping.

C

A static NAT uses a many to many mapping.

D

A static NAT uses a one to one mapping.

单选题 Which of the following specifies a set of consistent requirements for a workstation or server?()

A

Vulnerability assessment

B

Imaging software

C

Patch management

D

Configuration baseline

最新资讯