单选题Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()A Protocol analyzerB Vulnerability scannerC Port scannerD Penetration test

题目
单选题
Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()
A

Protocol analyzer

B

Vulnerability scanner

C

Port scanner

D

Penetration test

参考答案和解析
正确答案: B
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which of the following monitors a server to see which protocols might be in use?()

A. Ping sweep

B. Intrusion detection software

C. Port scanner

D. Wireless packet sniffer


参考答案:B

第2题:

Examine the following options,which Spanning Tree Protocol (STP) protection mechanism disables aswitch port if the port receives a Bridge Protocol Data Unit (BPDU)?()

  • A、Uplink Fast
  • B、Port Fast
  • C、BPDU Guard
  • D、Root Guard

正确答案:C

第3题:

Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()

A. Honeynet

B. Honeypot

C. Vulnerability scanner

D. Network based IDS


参考答案:A

第4题:

Which of the following is the BEST way to allow web software through the server firewall?()

  • A、Implement an application exception.
  • B、Implement an access control list (ACL).
  • C、Open the corporate firewall to allow port 80.
  • D、Implement port blocking on port 80.

正确答案:B

第5题:

Which of the following monitors a server to see which protocols might be in use?()

  • A、Ping sweep
  • B、Intrusion detection software
  • C、Port scanner
  • D、Wireless packet sniffer

正确答案:B

第6题:

Which of the following is the BEST way to allow web software through the server firewall?()

A. Implement an application exception.

B. Implement an access control list (ACL).

C. Open the corporate firewall to allow port 80.

D. Implement port blocking on port 80.


参考答案:B

第7题:

Which of the following allows a program or port through a software firewall?()

  • A、Exception
  • B、Pass-through
  • C、Port-forwarding
  • D、Punch-through

正确答案:A

第8题:

Which of the following is the LEAST intrusive?()

A. Firmware update

B. Remote management card

C. Diagnostic LEDs

D. Multimeter


参考答案:C

第9题:

Which of the following is the EASIEST way to centrally deploy software?()

  • A、Network share
  • B、PXE
  • C、USB
  • D、Optical media

正确答案:A

第10题:

Which of the following would an attacker use to footprint a system?()

  • A、RADIUS
  • B、Password cracker
  • C、Port scanner
  • D、Man-in-the-middle attack

正确答案:C

更多相关问题