A.Vulnerability assessment B.Imaging software C.Patch management D.Configuration baseline
单项选择题WhichofthefollowingsecuritypoliciesisBESTtousewhentryingtomitigatetherisksinvolvedwithallowingausertoaccesscompanyemailviatheircellphone?()
A.The cell phone should require a password after a set period of inactivity. B.The cell phone should only be used for company related emails. C.The cell phone data should be encrypted according to NIST standards. D.The cell phone should have data connection abilities disabled.
单项选择题IfauserattemptstogotoawebsiteandnoticestheURLhaschanged,whichofthefollowingattacksisMOSTlikelythecause?()
A.DLL injection B.DDoS attack C.DNS poisoning D.ARP poisoning
单项选择题WhichofthefollowingistheLEASTintrusivewayofcheckingtheenvironmentforknownsoftwareflaws?()
A.Protocol analyzer B.Vulnerability scanner C.Port scanner D.Penetration test
单项选择题Whichofthefollowingrequiresanupdatetothebaselineafterinstallingnewsoftwareonamachine?()
A.Signature-based NIPS B.Signature-based NIDS C.Honeypot D.Behavior-based HIDS
单项选择题Anadministratorwantstoproactivelycollectinformationonattackersandtheirattemptedmethodsofgainingaccesstotheinternalnetwork.Whichofthefollowingwouldallowtheadministratortodothis?()
A.NIPS B.Honeypot C.DMZ D.NIDS