多项选择题
A.Pass B.Flow C.Allow D.Inspect
Whichmethodisofgainingaccesstoasystemthatbypassesnormal...
单项选择题Which method is of gaining access to a system that bypasses normal security measures?()
A.Starting a Smurf attack B.Conducting social engineering C.Creating a back door D.Launching a DoS attack
Whichoptionensuresthatdataisnotmodifiedintransit?()A.Au...
单项选择题Which option ensures that data is not modified in transit?()
A.Authorization B.Confidentiality C.Authentication D.Integrity
Whichtypeofintrusionpreventiontechnologywillbeprimarily...
单项选择题Which type of intrusion prevention technology will be primarily used by the Cisco IPS security appliances?()
A.signature-based B.profile-based C.rule-based D.protocol analysis-based