單項(xiàng)選擇題CSA protects your host by: ()

A. Preventing browsers from opening network sockets inlistening state.
B. Preventingbuffer overflows.
C. Preventingusers from entering unencrypted passwords
D. Preventing browsers from acting as client to webservers.


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Choose the most correct statements about SMTP/ESMTP. ()

A. Open mail relays are often used for spamming.
B. ESMTP does NOT provide more security features than SMTP
C. SMTPdoes provide authenticated email sending."
D. Worms often spread via SMTP.

2.單項(xiàng)選擇題Cisco Clean Access ensures that computers connecting to your network have which of the following?()

A. No vulnerable applications or operating systems
B. No viruses or worms
C. Appropriate security applications and patch levels
D. Current IPS signatures
E. Cisco Security Agent

3.單項(xiàng)選擇題Which of these is the best way to provide sender non-repudiation?()

A. pre-sharedkey
B. secure hash
C. SSL
D. RSA signature

4.單項(xiàng)選擇題What group in Cisco IOS does 1536-bit Diffie-Hellman prime modulus equivalent too?()

A. group 3
B. group 1
C. group 5
D. group 7

5.單項(xiàng)選擇題What are the header sizes for point-to-point and multi-point GRE(also known asmGRE) with tunnel key?()

A. 4 bytes for both
B. 4 bytes, and 8 bytes respectively
C. 8 bytes for both
D. 24 bytes for both

最新試題

Since HTTP is one of the most common protocols used in the internet, what should be done at a firewall level to ensure thatthe protocol is being used correctly? ()

題型:單項(xiàng)選擇題

When implementing internet standards you are required to follow RFC’s processes and procedures based onwhat RFC?()

題型:單項(xiàng)選擇題

ASDM on the ASA platform is executed as:()

題型:單項(xiàng)選擇題

What is true about SYN cookies?()

題型:單項(xiàng)選擇題

What Cisco technology protects against Spanning-Tree Protocol manipulation?()

題型:單項(xiàng)選擇題

For a router to obtain a certificate from a CA, what is the first stepof the certificate enrollment process?()

題型:單項(xiàng)選擇題

Which should be the key driver for a company security policy’s creation, implementation and enforcement?()

題型:單項(xiàng)選擇題

Which one of the following is NOT a valid RADIUS packet type?()

題型:單項(xiàng)選擇題

Which two statements are correct about the aaa authentication login default grouptacacs+ localglobal configuration command? ()

題型:多項(xiàng)選擇題

Which of the following statements that describe Diffie Hellman Key exchange are correct? ()

題型:多項(xiàng)選擇題