Which of the following could be used to prevent an attacker

题目
单选题
Which of the following could be used to prevent an attacker from accessing the master boot drive when attaching a hard drive to another system?()
A

BIOS password

B

Domain membership

C

EFS

D

Bitlocker

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()

  • A、Attacker sends multiple DHCP requests flooding DHCP server
  • B、Attacker connects rogue server initiating DHCP requests
  • C、Attacker connects rogue server replying to DHCP requests
  • D、Attacker sends DHCP jam signal causing DHCP server to crash
  • E、Attacker sends gratuitous ARP replies, thereby jamming the DHCP server
  • F、Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server

正确答案:A,C

第2题:

Which of the following commands could be used to start the Management Console on a workstation running Windows 2000/XP?()

  • A、Start > Run > MCP
  • B、Start > Run > MCE
  • C、Start > Run > MCA
  • D、Start > Run > MMC

正确答案:D

第3题:

A legacy network that is prone to errors may have issues with services that use UDP. Which of the following services could have problems in this case, due to the fact that UDP is used?()

A.DNS

B.Telnet

C.SMTP

D.SNMP

E.HTTP

F.TFTP


参考答案:A, D, F

第4题:

Which of the following would an attacker use to footprint a system?()

  • A、RADIUS
  • B、Password cracker
  • C、Port scanner
  • D、Man-in-the-middle attack

正确答案:C

第5题:

Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()

  • A、RIP
  • B、0S:F
  • C、STP
  • D、EGP

正确答案:C

第6题:

Which of the following could be used to provide a Layer 3 data path between separate VLANs?()

  • A、 VLAN trunking
  • B、 An external router
  • C、 An internal route processor
  • D、 VLAN capable bridge
  • E、 EtherChannel

正确答案:B,C

第7题:

A legacy network that is prone to errors may have issues with services that use UDP. Which of the following services could have problems in this case, due to the fact that UDP is used?()

  • A、DNS
  • B、Telnet
  • C、SMTP
  • D、SNMP
  • E、HTTP
  • F、TFTP

正确答案:A,D,F

第8题:

Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()

  • A、Spanning Tree Protocol
  • B、Shortest path first tree
  • C、Link-state advertisements (LSA)
  • D、Hold-down timers
  • E、Split horizon
  • F、VRP

正确答案:D,E

第9题:

Which of the following could be used to restrict access to the local web server to only certain IP addresses?()

  • A、 Create an ACL.
  • B、 Create an application exception.
  • C、 Configure IPSec.
  • D、 Block port 80.

正确答案:A

第10题:

Which of the following storage tools could be used to initiate the rebuilding of a failed hard drive?()

  • A、RAID array management
  • B、CHKDSK
  • C、Monitoring agents
  • D、Partitioning management

正确答案:A

更多相关问题