A.Signature-based NIPS
B.Signature-based NIDS
C.Honeypot
D.Behavior-based HIDS
您可能感兴趣的试卷
你可能感兴趣的试题
A.Protocol analyzer
B.Vulnerability scanner
C.Port scanner
D.Penetration test
A.NIPS
B.Honeypot
C.DMZ
D.NIDS
A.RADIUS
B.Password cracker
C.Port scanner
D.Man-in-the-middle attack
A.Intrusion detection
B.Virtualization
C.Kiting
D.Cloning
A.A static NAT uses a one to many mapping.
B.A static NAT uses a many to one mapping.
C.A static NAT uses a many to many mapping.
D.A static NAT uses a one to one mapping.
A.S/MIME
B.SSH
C.3DES
D.IPSec
A.Vulnerability assessment
B.Imaging software
C.Patch management
D.Configuration baseline
![](https://static.ppkao.com/ppmg/img/appqrcode.png)
最新试题
If a user attempts to go to a website and notices the URL has changed, which of the following attacks is MOST likely the cause?()
Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()
An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()
Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()
Which of the following requires an update to the baseline after installing new software on a machine?()
Which of the following would an attacker use to footprint a system?()
Which of the following describes a static NAT?()
Which of the following encryption methods is often used along with L2TP?()
Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()
Which of the following specifies a set of consistent requirements for a workstation or server?()