多选题What are three main phases of an attack?()ADoSBexploitCpropagationDport scanningEreconnaissance

题目
多选题
What are three main phases of an attack?()
A

DoS

B

exploit

C

propagation

D

port scanning

E

reconnaissance

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

What are three configuration objects used to build Junos IDP rules? ()(Choose three.)

A. zone objects

B. policy objects

C. attack objects

D. alert and notify objects

E. network and address objects


参考答案:A, C, E

第2题:

What are the three main forms of word building in English?
Affixation, compounding and conversion.

第3题:

Viruses usually have two phases to their execution, the infection phase and the(75)phase. The later phase is optional, since stone viruses simply reproduce.

A.reproduce

B.proliferation

C.defend

D.attack


正确答案:D
解析:译文:病毒在执行的过程中通常有两个阶段:感染阶段和攻击阶段。有些病毒只进行简单的复制,因此可能没有攻击阶段。

第4题:

What are three pieces of information that the Cisco IOS show inventory command displays on a Cisco ISR Router? ()(Choose three.)

  • A、Installed Hardware serial numbers
  • B、The status of installed hardware
  • C、Installed hardware
  • D、Unique Device Identifier
  • E、system internal temperature
  • F、main power supply condition

正确答案:A,C,D

第5题:

What are the three main parts of a syslog message? ()(Choose three.)

  • A、severity level
  • B、facility
  • C、log message name
  • D、time stamp
  • E、error codes
  • F、access privilege

正确答案:A,C,D

第6题:

What are the three main parts of a syslog message? ()(Choose three.)

A. severity level

B. facility

C. log message name

D. time stamp

E. error codes

F. access privilege


参考答案:A, C, D

第7题:

Network Security is a continuous process. Which three phases apply to this process?()

  • A、Configure
  • B、Improve
  • C、Operate
  • D、Monitor
  • E、Secure
  • F、Troubleshooting

正确答案:B,D,E

第8题:

What are three valid Juniper Networks IPS attack object types?() (Choose three.)

A. signature

B. anomaly

C. trojan

D. virus

E. chain


参考答案:A, B, E

第9题:

What are the three main types of networks that must be considered when defining a security policy?


正确答案:Trusted, untrusted, unknown.

第10题:

What are three valid Juniper Networks IPS attack object types?() (Choose three.)

  • A、signature
  • B、anomaly
  • C、trojan
  • D、virus
  • E、chain

正确答案:A,B,E

更多相关问题