单项选择题What are the four steps, in their correct order, to mitigate a worm attack?()

A.contain,inoculate,quarantine,and treat
B.inoculate,contain,quarantine,and treat
C.quarantine,contain,inoculate,and treat
D.preparation,identification,traceback,and postmortem
E.preparation,classification,reaction,and treat
F.identification,inoculation,postmortem,and reaction


您可能感兴趣的试卷

你可能感兴趣的试题

1.多项选择题Which two network attack statements are true?()

A.Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.
B.Access attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.
C.DoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.
D.DoS attacks can consist of IP spoofing and DDoS attacks.
E.IP spoofing can be reduced through the use of policy-based routing.
F.IP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.

2.单项选择题

Refer to the exhibit. What statement is true about the interface S1/0 on router R1?()

A.Labeled packets can be sent over an interface.
B.MPLS Layer 2 negotiations have occurred.
C.IP label switching has been disabled on this interface.
D.None of the MPLS protocols have been configured on the interface.

3.多项选择题Which two statements describe the functions and operations of IDS and IPS systems?()

A.A network administrator entering a wrong password would generate a true-negative alarm.
B.A false positive alarm is generated when an IDS/IPS signature is correctly identified.
C.An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.
D.Cisco IDS works inline and stops attacks before they enter the network.
E.Cisco IPS taps the network traffic and responds after an attack.
F.Profile-based intrusion detection is also known as "anomaly detection".

4.多项选择题Which two statements about common network attacks are true?()

A.Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.
B.Access attacks can consist of password attacks,ping sweeps,port scans,and man-in-the-middle attacks.
C.Access attacks can consist of packet sniffers,ping sweeps,port scans,and man-in-the-middle attacks.
D.Reconnaissance attacks can consist of password attacks,trust exploitation,port redirection and Internet information queries.
E.Reconnaissance attacks can consist of packet sniffers,port scans,ping sweeps,and Internet information queries.
F.Reconnaissance attacks can consist of ping sweeps,port scans,man-in-middle attacks and Internet information queries.

5.多项选择题Which three statements are true about Cisco IOS Firewall?()

A.It can be configured to block Java traffic.
B.It can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.
C.It can only examine network layer and transport layer information.
D.It can only examine transport layer and application layer information.
E.The inspection rules can be used to set timeout values for specified protocols.
F.The ip inspect cbac-name command must be configured in global configuration mode.

6.多项选择题Which three features are benefits of using GRE tunnels in conjunction with IPsec for building site-to-site VPNs?()

A.allows dynamic routing over the tunnel
B.supports multi-protocol (non-IP) traffic over the tunnel
C.reduces IPsec headers overhead since tunnel mode is used
D.simplifies the ACL used in the crypto map
E.uses Virtual Tunnel Interface (VTI) to simplify the IPsec VPN configuration

7.多项选择题What are three objectives that the no ip inspect command achieves?()

A.removes the entire CBAC configuration
B.removes all associated static ACLs
C.turns off the automatic audit feature in SDM
D.denies HTTP and Java applets to the inside interface but permits this traffic to the DMZ
E.resets all global timeouts and thresholds to the defaults
F.deletes all existing sessions

8.多项选择题

Refer to the exhibit. On the basis of the information that is provided, which two statements are true?()

A.An IPS policy can be edited by choosing the Edit button.
B.Right-clicking on an interface will display a shortcut menu with options to edit an action or to set severity levels.
C.The Edit IPS window is currently in Global Settings view.
D.The Edit IPS window is currently in IPS Policies view.
E.The Edit IPS window is currently in Signatures view.
F.To enable an IPS policy on an interface, click on the interface and deselect Disable.

9.多项选择题

Refer to the exhibit. On the basis of the information in the exhibit,which two statements are true?()

A.Any traffic matching signature 1107 will generate an alarm, reset the connection,and be dropped.
B.Signature 1102 has been modified, but the changes have not been applied to the router.
C.Signature 1102 has been triggered because of matching traffic.
D.The Edit IPS window is currently displaying the Global Settings information.
E.The Edit IPS window is currently displaying the signatures in Details view.
F.The Edit IPS window is currently displaying the signatures in Summary view.

10.多项选择题

Refer to the exhibit. Which two statements about the AAA configuration are true?()

A.A good security practice is to have the none parameter configured as the final method used to ensure that no other authentication method will be used.
B.If a TACACS+ server is not available, then a user connecting via the console port would not be able to gain access since no other authentication method has been defined.
C.If a TACACS+ server is not available, then the user Bob could be able to enter privileged mode as long as the proper enable password is entered.
D.The aaa new-model command forces the router to override every other authentication method previously configured for the router lines.
E.To increase security, group radius should be used instead of group tacacs+.
F.Two authentication options are prescribed by the displayed aaa authentication command.