niusouti.com

单选题Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()A Protocol analyzerB Vulnerability scannerC Port scannerD Penetration test

题目
单选题
Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()
A

Protocol analyzer

B

Vulnerability scanner

C

Port scanner

D

Penetration test


相似考题
更多“单选题Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()A Protocol analyzerB Vulnerability scannerC Port scannerD Penetration test”相关问题
  • 第1题:

    Examine the following options,which Spanning Tree Protocol (STP) protection mechanism disables aswitch port if the port receives a Bridge Protocol Data Unit (BPDU)?()

    • A、Uplink Fast
    • B、Port Fast
    • C、BPDU Guard
    • D、Root Guard

    正确答案:C

  • 第2题:

    Which of the following monitors a server to see which protocols might be in use?()

    • A、Ping sweep
    • B、Intrusion detection software
    • C、Port scanner
    • D、Wireless packet sniffer

    正确答案:B

  • 第3题:

    Which of the following is the BEST way to allow web software through the server firewall?()

    • A、Implement an application exception.
    • B、Implement an access control list (ACL).
    • C、Open the corporate firewall to allow port 80.
    • D、Implement port blocking on port 80.

    正确答案:B

  • 第4题:

    An administrator is planning an upgrade of a major software package on an application server.The software has been tested successfully in a test environment and it is ready to go into production. Which of the following steps should the administrator take next?()

    • A、Identify necessary operating system updates
    • B、Implement the change
    • C、Document the change
    • D、Schedule system down time

    正确答案:D

  • 第5题:

    Which of the following is the LEAST intrusive?()

    • A、Firmware update
    • B、Remote management card
    • C、Diagnostic LEDs
    • D、Multimeter

    正确答案:C

  • 第6题:

    Your database is not configured for session failover. Your tnsnames.ora file contains the following details:  test.us.oracle.com= (DESCRIPTION=  (ADDRESS_LIST= (LOAD_BALANCE=off)   (FAILOVER=ON)   (ADDRESS= (PROTOCOL=tcp)(HOST=test1-server)(PORT=1521))   (ADDRESS= (PROTOCOL=tcp)(HOST=test2-server)(PORT=1521)))   (CONNECT_DATA= (SERVICE_NAME=test.us.oracle.com)))   Which feature is enabled in this case?()

    • A、Load balancing
    • B、Instance failover
    • C、Database failover
    • D、Connect-time failover
    • E、Transparent Application Failover (TAF)

    正确答案:D

  • 第7题:

    单选题
    Which of the following should Karen, a technician, use to test a parallel port?()
    A

    Line tester

    B

    Multimeter

    C

    Null modem cable

    D

    Loopback plugs


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    Your database is not configured for session failover. Your tnsnames.ora file contains the following details:  test.us.oracle.com= (DESCRIPTION=  (ADDRESS_LIST= (LOAD_BALANCE=off)   (FAILOVER=ON)   (ADDRESS= (PROTOCOL=tcp)(HOST=test1-server)(PORT=1521))   (ADDRESS= (PROTOCOL=tcp)(HOST=test2-server)(PORT=1521)))   (CONNECT_DATA= (SERVICE_NAME=test.us.oracle.com)))   Which feature is enabled in this case?()
    A

    Load balancing

    B

    Instance failover

    C

    Database failover

    D

    Connect-time failover

    E

    Transparent Application Failover (TAF)


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    An administrator is planning an upgrade of a major software package on an application server.The software has been tested successfully in a test environment and it is ready to go into production. Which of the following steps should the administrator take next?()
    A

    Identify necessary operating system updates

    B

    Implement the change

    C

    Document the change

    D

    Schedule system down time


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    An administrator is planning an upgrade of a major software package on an application server. The software has been tested successfully in a test environment and it is ready to go into production.  Which of the following steps should the administrator take next?()
    A

     Identify necessary operating system updates

    B

     Implement the change

    C

     Document the change

    D

     Schedule system down time


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    An administrator is planning an upgrade of a major software package on an application server.The software has been identified, the project approved and the upgrade purchased. Which of the following steps should the administrator take NEXT?()
    A

    Create a test environment for the new version.

    B

    Determine system requirements for the upgrade.

    C

    Request bids from other competing vendors in the product space.

    D

    Document the upgrade.


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following allows a program or port through a software firewall?()
    A

    Exception

    B

    Pass-through

    C

    Port-forwarding

    D

    Punch-through


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Which of the following allows a program or port through a software firewall?()

    • A、Exception
    • B、Pass-through
    • C、Port-forwarding
    • D、Punch-through

    正确答案:A

  • 第14题:

    Which of the following is the EASIEST way to centrally deploy software?()

    • A、Network share
    • B、PXE
    • C、USB
    • D、Optical media

    正确答案:A

  • 第15题:

    Which of the following would an attacker use to footprint a system?()

    • A、RADIUS
    • B、Password cracker
    • C、Port scanner
    • D、Man-in-the-middle attack

    正确答案:C

  • 第16题:

    Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()

    • A、Protocol analyzer
    • B、Vulnerability scanner
    • C、Port scanner
    • D、Penetration test

    正确答案:B

  • 第17题:

    Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()

    • A、Honeynet
    • B、Honeypot
    • C、Vulnerability scanner
    • D、Network based IDS

    正确答案:A

  • 第18题:

    单选题
    Which of the following is the BEST way to allow web software through the server firewall?()
    A

    Implement an application exception.

    B

    Implement an access control list (ACL).

    C

    Open the corporate firewall to allow port 80.

    D

    Implement port blocking on port 80.


    正确答案: C
    解析: 暂无解析

  • 第19题:

    单选题
    Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()
    A

    Protocol analyzer

    B

    Vulnerability scanner

    C

    Port scanner

    D

    Penetration test


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    For the following ports, which port is on every bridge in a Spanning Tree Protocol IEEE 802.1w network except the root bridge?()
    A

    root port

    B

    backup port

    C

    designated port

    D

    alternate port


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following is the EASIEST way to centrally deploy software?()
    A

     Network share

    B

     PXE

    C

     USB

    D

     Optical media


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following is the LEAST intrusive?()
    A

    Firmware update

    B

    Remote management card

    C

    Diagnostic LEDs

    D

    Multimeter


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following is the EASIEST way to centrally deploy software?()
    A

    Network share

    B

    PXE

    C

    USB

    D

    Optical media


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    Examine the following options,which Spanning Tree Protocol (STP) protection mechanism disables aswitch port if the port receives a Bridge Protocol Data Unit (BPDU)?()
    A

    Uplink Fast

    B

    Port Fast

    C

    BPDU Guard

    D

    Root Guard


    正确答案: B
    解析: 暂无解析