In order to strengthen maritime security and prevent and sup

题目
单选题
In order to strengthen maritime security and prevent and suppress acts of terrorism against shipping, a new, comprehensive security regime for international shipping was set to enter into force in July 2004 The new regime is().
A

ISM Code

B

ISPS Code

C

FSS Code

D

IBC Code

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()

A.IDS

B.VPN

C.NIPS

D.HIDS


参考答案:C

第2题:

Until security has been provided the Contractor shall have a maritime lien on ______ for his remuneration.

A.the property lost

B.the property salved

C.the property involved in the accident which gave rise to the salvage operations

D.any other property in danger which is not and has not been on board the vessel


正确答案:B

第3题:

In order to strengthen his muscles, Mike goes to the gym ( ) to do exercises.

A.increasingly

B.often

C.regularly

D.lively


参考答案:C

第4题:

A customer wants to check whether they have the necessary tools enabled to prevent intrusions andvirus attacks on a Windows Vista workstation. Which of the following tools can be used to display thecurrent configuration? ()

  • A、Security Center
  • B、Event Viewer Security log
  • C、Windows Defender
  • D、Windows Firewall

正确答案:A

第5题:

What are three benefits of the Cisco Adaptive Threat Defense strategy? (Choose three.) ()

  • A、 using QoS techniques such as Traffic Policing to rate limit suspected traffic to prevent DoS attacks
  • B、 automatic reconfiguration s of the security devices based on current security threats
  • C、 containment and control of security threats
  • D、 application security
  • E、 anti-x defense F- virtual firewall

正确答案:C,D,E

第6题:

The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()

A. intrusion protection

B. identity

C. secure connectivity

D. security management


参考答案:B, D

第7题:

The writers of the Constitution worked out the Constitution worked out the checks and balances in order to()

  • A、prevent the government from misusing its power
  • B、prevent the government from being strong
  • C、pacify those who opposed the Constitution
  • D、meet the demands of small states.

正确答案:A

第8题:

The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?

A.To prevent unauthorized hosts from getting access to the LAN

B.To limit the number of Layer 2 broadcasts on a particular switch port

C.To prevent unauthorized Telnet or SSH access to a switch port

D.To prevent the IP and MAC address of the switch and associated ports

E.None of the above


正确答案:A
解析:Explanation:
You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that port is assured the full bandwidth of the port.

If a port is configured as a secure port and the maximum number of secure MAC addresses is reached, when the MAC address of a station attempting to access the port is different from any of the identified secure MAC addresses, a security violation occurs. Also, if a station with a secure MAC address configured or learned on one secure port attempts to access another secure port, a violation is flagged.

第9题:

What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()

  • A、The ability to detect and prevent malicious traffic.
  • B、The ability to associate security breaches with a specific user.
  • C、Converged management of network and security events, network flow data, and identity information.
  • D、Consistent device management across administrative realms.

正确答案:B,C

第10题:

The Company security administrator wants to prevent VLAN hopping on the network.  What is one  method that can be used to do this?  ()

  • A、 Attacks are prevented by utilizing the port-security feature.
  • B、 An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.
  • C、 Configuring an interface with the switchport mode dynamic command will prevent VLAN  hopping.
  • D、 An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q  encapsulation.
  • E、 Configuring an interface with the "switchport mode access" command will prevent VLAN  hopping.

正确答案:B,E

更多相关问题