单选题Which software-based security threat is typically spread from user to user via e-mail?()A Data interceptionB VirusC Trojan horseD Denial of service

题目
单选题
Which software-based security threat is typically spread from user to user via e-mail?()
A

Data interception

B

Virus

C

Trojan horse

D

Denial of service

参考答案和解析
正确答案: A
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()

A. The ability to detect and prevent malicious traffic.

B. The ability to associate security breaches with a specific user.

C. Converged management of network and security events, network flow data, and identity information.

D. Consistent device management across administrative realms.


参考答案:B, C

第2题:

Which software-based security threat is typically spread from user to user via e-mail?()

A.Data interception

B.Virus

C.Trojan horse

D.Denial of service


参考答案:B

第3题:

A Windows Communication Foundation (WCF) service interacts with the database of a workflow engine. Data access authorization is managed by the database, which raises security exceptions if a user is unauthorized to access it.You need to ensure that the application transmits the exceptions raised by the database to the client that is calling the service.Which behavior should you configure and apply to the service?()

A.routing

B.service Debug

C.service Security Audit

D.workflow Unhandled Exception


参考答案:B

第4题:

A user received an email from their bank asking them to login and verify their personal information.The user complies and fills in the requested information. Days later the user notices their checking account is empty. This is a result of which of the following?()

  • A、Spam
  • B、Phishing
  • C、Adware
  • D、A Trojan

正确答案:B

第5题:

Which software-based security threat is typically spread from user to user via e-mail?()

  • A、Data interception
  • B、Virus
  • C、Trojan horse
  • D、Denial of service

正确答案:B

第6题:

What information does the Junos Pulse Access Control Service provide to Security Threat Response Manager (STRM)?()

A. Session length

B. User browser information

C. Session IP address

D. User identity information


参考答案:C, D

第7题:

Which software-based security threat is typically spread from user to user via e-mail?()

  • A、Virus
  • B、Trojan horse
  • C、Denial of service
  • D、Data interception

正确答案:A

第8题:

Consider the Mysql Enterprise Audit plugin. The following event detail is found in the audit log:Which two points can be concluded from the given event?()

A.A connection as the user kate was successful

B.A connection failed due to authentication being unsuccessful

C.A connection was attempted via socket rather than TCP

D.A connection was blocked by a firewall or a similar security mechanism

E.A connection failed because the proxy user privileges did not match the login user


参考答案:B, E

第9题:

Which of these user ICAP?()

  • A、 anti-malware scanning
  • B、 data loss prevention polices
  • C、 decryption policies
  • D、 CiscoIronPort Data Security policies

正确答案:B

第10题:

A Denial of Service (DoS) attack is:()

  • A、an attempt to bring down a website or other online service.
  • B、a prank where someone sends an unauthorized e-mail attempting to close a user’s e-mail account.
  • C、stealing a user’s identity and making changes to their accounts.
  • D、an attempt to change a user’s password to prevent access to a service by repeatedly guessing the user’s information.

正确答案:A

更多相关问题