單項(xiàng)選擇題What are the four steps, in their correct order, to mitigate a worm attack?()

A.contain,inoculate,quarantine,and treat
B.inoculate,contain,quarantine,and treat
C.quarantine,contain,inoculate,and treat
D.preparation,identification,traceback,and postmortem
E.preparation,classification,reaction,and treat
F.identification,inoculation,postmortem,and reaction


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which two network attack statements are true?()

A.Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.
B.Access attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.
C.DoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.
D.DoS attacks can consist of IP spoofing and DDoS attacks.
E.IP spoofing can be reduced through the use of policy-based routing.
F.IP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.

2.單項(xiàng)選擇題

Refer to the exhibit. What statement is true about the interface S1/0 on router R1?()

A.Labeled packets can be sent over an interface.
B.MPLS Layer 2 negotiations have occurred.
C.IP label switching has been disabled on this interface.
D.None of the MPLS protocols have been configured on the interface.

3.多項(xiàng)選擇題Which two statements describe the functions and operations of IDS and IPS systems?()

A.A network administrator entering a wrong password would generate a true-negative alarm.
B.A false positive alarm is generated when an IDS/IPS signature is correctly identified.
C.An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.
D.Cisco IDS works inline and stops attacks before they enter the network.
E.Cisco IPS taps the network traffic and responds after an attack.
F.Profile-based intrusion detection is also known as "anomaly detection".

4.多項(xiàng)選擇題Which two statements about common network attacks are true?()

A.Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.
B.Access attacks can consist of password attacks,ping sweeps,port scans,and man-in-the-middle attacks.
C.Access attacks can consist of packet sniffers,ping sweeps,port scans,and man-in-the-middle attacks.
D.Reconnaissance attacks can consist of password attacks,trust exploitation,port redirection and Internet information queries.
E.Reconnaissance attacks can consist of packet sniffers,port scans,ping sweeps,and Internet information queries.
F.Reconnaissance attacks can consist of ping sweeps,port scans,man-in-middle attacks and Internet information queries.

5.多項(xiàng)選擇題Which three statements are true about Cisco IOS Firewall?()

A.It can be configured to block Java traffic.
B.It can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.
C.It can only examine network layer and transport layer information.
D.It can only examine transport layer and application layer information.
E.The inspection rules can be used to set timeout values for specified protocols.
F.The ip inspect cbac-name command must be configured in global configuration mode.

最新試題

Which form of DSL technology is typically used as a replacement for T1 lines?()

題型:?jiǎn)雾?xiàng)選擇題

Which two statements are true about broadband cable (HFC) systems?()

題型:多項(xiàng)選擇題

Which statement describes the Authentication Proxy feature?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement about an IPS is true?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. MPLS has been configured on all routers in the domain. In order for R2 and R3 to forward frames between them with label headers, what additional configuration will be required on devices that are attached to the LAN segment?()

題型:?jiǎn)雾?xiàng)選擇題

When configuring the Cisco VPN Client,what action is required prior to installing Mutual Group Authentication?()

題型:?jiǎn)雾?xiàng)選擇題

Which two statements about the Cisco AutoSecure feature are true?()

題型:多項(xiàng)選擇題

Refer to the exhibit.Which three statements describe the steps that are required to configure an IPsec site-to-site VPN using a GRE tunnel?()

題型:多項(xiàng)選擇題

What are two steps that must be taken when mitigating a worm attack?()

題型:多項(xiàng)選擇題

Refer to the exhibit. Which order correctly identifies the steps to provision a cable modem to connect to a headend as defined by the DOCSIS standard?()

題型:?jiǎn)雾?xiàng)選擇題