DoS
exploit
propagation
port scanning
reconnaissance
What are the three main types of networks that must be considered when defining a security policy?
点击查看答案
What are three pieces of information that the Cisco IOS show inventory command displays on a Cisco ISR Router? ()(Choose three.)A、Installed Hardware serial numbersB、The status of installed hardwareC、Installed hardwareD、Unique Device IdentifierE、system internal temperatureF、main power supply condition
What are three valid Juniper Networks IPS attack object types?() (Choose three.)A、signatureB、anomalyC、trojanD、virusE、chain
Which three are the phases of the Cisco Smart Business Roadmap?()A、foundationB、optimizedC、implementedD、growthE、finishedF、beginning
What are three configuration objects used to build Junos IDP rules? ()(Choose three.)A、zone objectsB、policy objectsC、attack objectsD、alert and notify objectsE、network and address objects
What are three configuration objects used to build JUNOS IDP rules?()A、zone objectsB、policy objectsC、attack objectsD、alert and notify objectsE、network and address objects
What are three main phases of an attack?()A、DoSB、exploitC、propagationD、port scanningE、reconnaissance