欢迎来到计算机考试题库网 计算机题库官网
logo
全部科目 > 软件认证工程师考试 > 思科认证考试 > CCNP系列认证 > CCNP(642-825)

单项选择题

What are the four steps, in their correct order, to mitigate a worm attack?()

    A.contain,inoculate,quarantine,and treat
    B.inoculate,contain,quarantine,and treat
    C.quarantine,contain,inoculate,and treat
    D.preparation,identification,traceback,and postmortem
    E.preparation,classification,reaction,and treat
    F.identification,inoculation,postmortem,and reaction

点击查看答案

相关考题

  • 多项选择题
    Whichtwonetworkattackstatementsaretrue?()

    A.Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.
    B.Access attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.
    C.DoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.
    D.DoS attacks can consist of IP spoofing and DDoS attacks.
    E.IP spoofing can be reduced through the use of policy-based routing.
    F.IP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.

  • 单项选择题
    Refer to the exhibit. What statement is true about the interface S1/0 on router R1?()

    A.Labeled packets can be sent over an interface.
    B.MPLS Layer 2 negotiations have occurred.
    C.IP label switching has been disabled on this interface.
    D.None of the MPLS protocols have been configured on the interface.

  • 多项选择题
    WhichtwostatementsdescribethefunctionsandoperationsofIDSandIPSsystems?()

    A.A network administrator entering a wrong password would generate a true-negative alarm.
    B.A false positive alarm is generated when an IDS/IPS signature is correctly identified.
    C.An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.
    D.Cisco IDS works inline and stops attacks before they enter the network.
    E.Cisco IPS taps the network traffic and responds after an attack.
    F.Profile-based intrusion detection is also known as "anomaly detection".

微信小程序免费搜题
微信扫一扫,加福利官免费搜题

微信扫一扫,加福利官免费搜题