单选题 An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()
NIPS
Honeypot
DMZ
NIDS
单选题 If a user attempts to go to a website and notices the URL has changed, which of the following attacks is MOST likely the cause?()
DLL injection
DDoS attack
DNS poisoning
ARP poisoning
单选题 Which of the following requires an update to the baseline after installing new software on a machine?()
Signature-based NIPS
Signature-based NIDS
Honeypot
Behavior-based HIDS
单选题 Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()
Protocol analyzer
Vulnerability scanner
Port scanner
Penetration test
单选题 Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()
Intrusion detection
Virtualization
Kiting
Cloning
单选题 Which of the following would an attacker use to footprint a system?()
RADIUS
Password cracker
Port scanner
Man-in-the-middle attack
单选题 Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()
The cell phone should require a password after a set period of inactivity.
The cell phone should only be used for company related emails.
The cell phone data should be encrypted according to NIST standards.
The cell phone should have data connection abilities disabled.
单选题 Which of the following describes a static NAT?()
A static NAT uses a one to many mapping.
A static NAT uses a many to one mapping.
A static NAT uses a many to many mapping.
A static NAT uses a one to one mapping.
单选题 Which of the following specifies a set of consistent requirements for a workstation or server?()
Vulnerability assessment
Imaging software
Patch management
Configuration baseline
单选题 Which of the following encryption methods is often used along with L2TP?()
S/MIME
SSH
3DES
IPSec
公文的发文闭合程序?
初始评审的目的是为职业安全健康管理体系建立和实施提供基础,为职业安全健康管理体系的持续改进( )。
抗体是由下列哪种细胞产生的()
营业外收入是指企业发生的与其日常活动无直接关系的利得。
对于PowerPoint2003中文本框内的文字,设置项目符号可以采用的是()。
牵引装置的分类,可分为()。
USB是并行、串行数据传输模式之外的第3种传输模式。
足月新生儿,出生体重2.3kg,羊膜早破,生后2天拒奶,呕吐,发绀,黄疸进行性加重。体检:体温不升,前囟平,颈软,全身黄染,心率150次/分,心音及心率正常,腹软,肝肋下3cm。化验:白细胞20×109/L,中性粒细胞占80%,胆红素308μmol/L,血型“O”,母亲血型为“A”,最大可能是()
引起肾盂肾炎最常见的致病菌是( )。
女性患者,54岁,劳动中突感头晕,随即左半身无力,右眼闭合不全,双眼向左侧凝视,10分钟后昏迷。高热、双瞳孔小、四肢软瘫,应考虑的诊断是()