单项选择题
A.Protocol analyzer B.Vulnerability scanner C.Port scanner D.Penetration test
Anadministratorwantstoproactivelycollectinformationonat...
单项选择题An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()
A.NIPS B.Honeypot C.DMZ D.NIDS
Whichofthefollowingwouldanattackerusetofootprintasystem...
单项选择题Which of the following would an attacker use to footprint a system?()
A.RADIUS B.Password cracker C.Port scanner D.Man-in-the-middle attack
Whichofthefollowingtechnologiescanbeusedasameanstoisola...
单项选择题Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()
A.Intrusion detection B.Virtualization C.Kiting D.Cloning