Protocol analyzer
Vulnerability scanner
Port scanner
Penetration test
第1题:
A. Ping sweep
B. Intrusion detection software
C. Port scanner
D. Wireless packet sniffer
第2题:
Examine the following options,which Spanning Tree Protocol (STP) protection mechanism disables aswitch port if the port receives a Bridge Protocol Data Unit (BPDU)?()
第3题:
A. Honeynet
B. Honeypot
C. Vulnerability scanner
D. Network based IDS
第4题:
Which of the following is the BEST way to allow web software through the server firewall?()
第5题:
Which of the following monitors a server to see which protocols might be in use?()
第6题:
A. Implement an application exception.
B. Implement an access control list (ACL).
C. Open the corporate firewall to allow port 80.
D. Implement port blocking on port 80.
第7题:
Which of the following allows a program or port through a software firewall?()
第8题:
A. Firmware update
B. Remote management card
C. Diagnostic LEDs
D. Multimeter
第9题:
Which of the following is the EASIEST way to centrally deploy software?()
第10题:
Which of the following would an attacker use to footprint a system?()