单选题Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()A Intrusion detectionB VirtualizationC KitingD Cloning

题目
单选题
Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()
A

Intrusion detection

B

Virtualization

C

Kiting

D

Cloning

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which of the following constraint types can be used to ensure the value of an INTEGER column references only positive values?()

  • A、Unique
  • B、Check
  • C、Referential
  • D、Informational

正确答案:B

第2题:

Which of the following technologies can be used to remotely gain access to a server console?()

  • A、PS/2 KVM
  • B、LDAP
  • C、VNC
  • D、Remote desktop
  • E、VPN

正确答案:C,D

第3题:

WhichofthefollowingtechnologiescanbeusedasameanstoisolateahostOSfromsometypesofsecuritythreats?()

A.Intrusiondetection

B.Virtualization

C.Kiting

D.Cloning


参考答案:B

第4题:

Which of the following cable types can be used to decrease susceptibility to electronic eavesdropping?()

  • A、Fiber optic
  • B、Fast Ethernet
  • C、Coaxial
  • D、Thicknet

正确答案:A

第5题:

Which of the following switches in Windows can be used to ping a host until stopped?()

  • A、-l
  • B、-a
  • C、-t
  • D、-f

正确答案:C

第6题:

Which of the following management types can be used to deploy appropriate quality-of-servicesolutions to make the most efficient use of bandwidth?()

  • A、Fault management
  • B、Accounting management
  • C、Operations management
  • D、Performance management
  • E、Security management
  • F、Configuration management

正确答案:D

第7题:

When a user’s computer is first turned on, they see a lock symbol and a blinking cursor. Which of the following was configured in the BIOS to show this?()

  • A、Intrusion detection
  • B、Power on password
  • C、Drive encryption
  • D、BIOS password

正确答案:B

第8题:

Which of the following constraint types can be used to ensure the value of an INTEGER column references only positive values?()

A.Unique

B.Check

C.Referential

D.Informational


参考答案:B

第9题:

An administrator has been having problems with server security. Many of the servers have been infected with viruses in the past. Which of the following can be done to ensure that systems avoid OS exploits? ()

  • A、 Implement an intrusion detection system (IDS).
  • B、 Implement a dual-factor authentication method.
  • C、 Implement a patch management process.
  • D、 Implement stronger user passwords.

正确答案:C

第10题:

Which of the following can be used when installing the OS without a boot disk?()

  • A、ZFS
  • B、VMFS
  • C、PXE
  • D、PBX

正确答案:C

更多相关问题