多项选择题
What are two steps that must be taken when mitigating a worm attack?()
A.Inoculate systems by applying update patches.
B.Limit traffic rate.
C.Apply authentication.
D.Quarantine infected machines.
E.Enable anti-spoof measures.
相关考题
-
单项选择题
WhenconfiguringtheCiscoVPNClient,whatactionisrequiredpriortoinstallingMutualGroupAuthentication?()
A.Transparent tunneling must be enabled.
B.A valid root certificate must be installed.
C.A group pre-shared secret must be properly configured.
D.The option to "Allow Local LAN Access" must be selected. -
单项选择题
DuringtheEasyVPNRemoteconnectionprocess,whichphaseinvolvespushingtheIPaddress,DomainNameSystem(DNS),andsplittunnelattributestotheclient?()
A.mode configuration
B.the VPN client establishment of an ISAKMP SA
C.IPsec quick mode completion of the connection
D.VPN client initiation of the IKE phase 1 process -
多项选择题
WhichthreecategoriesofsignaturescanaCiscoIPSmicroengineidentify?()
A.DDoS signatures
B.strong signatures
C.exploit signatures
D.numeric signatures
E.spoofing signatures
F.connection signatures
