DoS
exploit
propagation
port scanning
reconnaissance
第1题:
A. zone objects
B. policy objects
C. attack objects
D. alert and notify objects
E. network and address objects
第2题:
What are the three main forms of word building in English?
Affixation, compounding and conversion.
略
第3题:
Viruses usually have two phases to their execution, the infection phase and the(75)phase. The later phase is optional, since stone viruses simply reproduce.
A.reproduce
B.proliferation
C.defend
D.attack
第4题:
What are three pieces of information that the Cisco IOS show inventory command displays on a Cisco ISR Router? ()(Choose three.)
第5题:
What are the three main parts of a syslog message? ()(Choose three.)
第6题:
A. severity level
B. facility
C. log message name
D. time stamp
E. error codes
F. access privilege
第7题:
Network Security is a continuous process. Which three phases apply to this process?()
第8题:
A. signature
B. anomaly
C. trojan
D. virus
E. chain
第9题:
What are the three main types of networks that must be considered when defining a security policy?
第10题:
What are three valid Juniper Networks IPS attack object types?() (Choose three.)