单项选择题
A.Signature-based NIPS B.Signature-based NIDS C.Honeypot D.Behavior-based HIDS
WhichofthefollowingistheLEASTintrusivewayofcheckingthee...
单项选择题Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()
A.Protocol analyzer B.Vulnerability scanner C.Port scanner D.Penetration test
Anadministratorwantstoproactivelycollectinformationonat...
单项选择题An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()
A.NIPS B.Honeypot C.DMZ D.NIDS
Whichofthefollowingwouldanattackerusetofootprintasystem...
单项选择题Which of the following would an attacker use to footprint a system?()
A.RADIUS B.Password cracker C.Port scanner D.Man-in-the-middle attack