单项选择题
Which method is of gaining access to a system that bypasses normal security measures?()
A.Starting a Smurf attack
B.Conducting social engineering
C.Creating a back door
D.Launching a DoS attack
点击查看答案
相关考题
-
单项选择题
Whichoptionensuresthatdataisnotmodifiedintransit?()
A.Authorization
B.Confidentiality
C.Authentication
D.Integrity -
单项选择题
WhichtypeofintrusionpreventiontechnologywillbeprimarilyusedbytheCiscoIPSsecurityappliances?()
A.signature-based
B.profile-based
C.rule-based
D.protocol analysis-based -
单项选择题
WhenconfiguringSSH,whichistheCiscominimumrecommendedmodulusvalue?()
A.2048 bits
B.1024 bits
C.256 bits
D.512 bits
