A.DLL injection B.DDoS attack C.DNS poisoning D.ARP poisoning
单项选择题Whichofthefollowingrequiresanupdatetothebaselineafterinstallingnewsoftwareonamachine?()
A.Signature-based NIPS B.Signature-based NIDS C.Honeypot D.Behavior-based HIDS
单项选择题WhichofthefollowingistheLEASTintrusivewayofcheckingtheenvironmentforknownsoftwareflaws?()
A.Protocol analyzer B.Vulnerability scanner C.Port scanner D.Penetration test
单项选择题Anadministratorwantstoproactivelycollectinformationonattackersandtheirattemptedmethodsofgainingaccesstotheinternalnetwork.Whichofthefollowingwouldallowtheadministratortodothis?()
A.NIPS B.Honeypot C.DMZ D.NIDS
单项选择题Whichofthefollowingwouldanattackerusetofootprintasystem?()
A.RADIUS B.Password cracker C.Port scanner D.Man-in-the-middle attack
单项选择题WhichofthefollowingtechnologiescanbeusedasameanstoisolateahostOSfromsometypesofsecuritythreats?()
A.Intrusion detection B.Virtualization C.Kiting D.Cloning