Data interception
Virus
Trojan horse
Denial of service
第1题:
A. The ability to detect and prevent malicious traffic.
B. The ability to associate security breaches with a specific user.
C. Converged management of network and security events, network flow data, and identity information.
D. Consistent device management across administrative realms.
第2题:
A.Data interception
B.Virus
C.Trojan horse
D.Denial of service
第3题:
A Windows Communication Foundation (WCF) service interacts with the database of a workflow engine. Data access authorization is managed by the database, which raises security exceptions if a user is unauthorized to access it.You need to ensure that the application transmits the exceptions raised by the database to the client that is calling the service.Which behavior should you configure and apply to the service?()
A.routing
B.service Debug
C.service Security Audit
D.workflow Unhandled Exception
第4题:
A user received an email from their bank asking them to login and verify their personal information.The user complies and fills in the requested information. Days later the user notices their checking account is empty. This is a result of which of the following?()
第5题:
Which software-based security threat is typically spread from user to user via e-mail?()
第6题:
A. Session length
B. User browser information
C. Session IP address
D. User identity information
第7题:
Which software-based security threat is typically spread from user to user via e-mail?()
第8题:
A.A connection as the user kate was successful
B.A connection failed due to authentication being unsuccessful
C.A connection was attempted via socket rather than TCP
D.A connection was blocked by a firewall or a similar security mechanism
E.A connection failed because the proxy user privileges did not match the login user
第9题:
Which of these user ICAP?()
第10题:
A Denial of Service (DoS) attack is:()