Which of the following are methods to automatically update t

题目
多选题
Which of the following are methods to automatically update the antivirus application?() (Select TWO).
A

Establish rules in the email scheduling program to perform updates.

B

Select Update Now from the program options.

C

Use the Automatic Update feature built into the application.

D

Use scripts.

E

Use Windows Update.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which of the following should an administrator do after running a command from the console onthe perimeter router?()

A. Update the configuration logs

B. Update the network wiring schematics

C. Update the network configuration procedures

D. Compare the configuration with the baseline


参考答案:A

第2题:

Which of the following are methods to automatically update the antivirus application?() (Select TWO).

  • A、Establish rules in the email scheduling program to perform updates.
  • B、Select Update Now from the program options.
  • C、Use the Automatic Update feature built into the application.
  • D、Use scripts.
  • E、Use Windows Update.

正确答案:C,D

第3题:

Which of the following scheduling methods uses more of the risk management concepts:

A ADM

B PDM

C CPM

D PERT

E Gantt


正确答案:D

第4题:

A technician is setting up a network and wants to automatically assign IP addresses. Which of the following will need to be configured to automatically assign IP addresses?()

  • A、WINS
  • B、DNS
  • C、DHCP
  • D、NTP

正确答案:C

第5题:

Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()

  • A、RIP
  • B、0S:F
  • C、STP
  • D、EGP

正确答案:C

第6题:

Which of the following privileges permits a user to update the comment on a sequence?()

A.CONTROL

B.UPDATE

C.USAGE

D.ALTER


参考答案:D

第7题:

Which of the following should an administrator do after running a command from the console onthe perimeter router?()

  • A、Update the configuration logs
  • B、Update the network wiring schematics
  • C、Update the network configuration procedures
  • D、Compare the configuration with the baseline

正确答案:A

第8题:

Which one of the following is not an acquisition method?

A advertising

B invitation

C negotiation

D purchase

E all are acquisition methods


正确答案:A

第9题:

Which of the following methods of user authentication is the MOST secure?()

  • A、CHAP
  • B、Kerberos
  • C、TACACS
  • D、EAP

正确答案:B

第10题:

Which of the following methods can move files in clear text and can be easily intercepted?()

  • A、RSH
  • B、SNMP
  • C、FTP
  • D、TELNET

正确答案:C

更多相关问题