A.aaa new-model command B.secret password for the root user C.usernames and passwords D.multiple privilege levels
多项选择题Whichthreeoptionsarenetworkevaluationtechniques?()
A.Performing end-user training on the use of antispyware software B.Performing virus scans C.Scanning a network for active IP addresses and open ports on those IP addresses D.Using password-cracking utilities
多项选择题WhichclassesdoestheU.S.governmentplaceclassifieddatainto?()
A.Top-secret B.Confidential C.SBU D.Secret
单项选择题Whichisthemaindifferencebetweenhost-basedandnetwork-basedintrusionprevention?()
A.Host-based IPS can work in promiscuous mode or inline mode. B.Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers. C.Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows. D.Host-based IPS deployment requires less planning than network-based IPS.
单项选择题Whichalgorithmwasthefirsttobefoundsuitableforbothdigitalsigningandencryption?()
A.HMAC B.RSA C.MD5 D.SHA-1
单项选择题Whichexampleisofafunctionintendedforcryptographichashing?()
A.MD65 B.SHA-135 C.XR12 D.MD5