A.RADIUS B.Password cracker C.Port scanner D.Man-in-the-middle attack
单项选择题WhichofthefollowingtechnologiescanbeusedasameanstoisolateahostOSfromsometypesofsecuritythreats?()
A.Intrusion detection B.Virtualization C.Kiting D.Cloning
单项选择题WhichofthefollowingdescribesastaticNAT?()
A.A static NAT uses a one to many mapping. B.A static NAT uses a many to one mapping. C.A static NAT uses a many to many mapping. D.A static NAT uses a one to one mapping.
单项选择题WhichofthefollowingencryptionmethodsisoftenusedalongwithL2TP?()
A.S/MIME B.SSH C.3DES D.IPSec
单项选择题Whichofthefollowingspecifiesasetofconsistentrequirementsforaworkstationorserver?()
A.Vulnerability assessment B.Imaging software C.Patch management D.Configuration baseline