- 积分
- 88
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 最后登录
- 1970-1-1
- 阅读权限
- 20
- 听众
- 收听
助理工程师
 
|

楼主 |
发表于 2020-11-17 22:35:26
|
显示全部楼层
QUESTION 14* h. G% L1 s2 }" ], {! p
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP0 s0 U8 |, U9 c9 H
commands to perform file retrieval from the server?: |; b. I8 {7 ~6 Z8 `6 @, ^; t) J
A. profile
- q; s2 s2 M. D0 J. @4 b' UB. url( e7 G+ ]% w' R# H( T. O
C. terminal
$ w0 p; C% o# jD. selfsigned
& r K/ l/ q' uCorrect Answer: A
7 v( R s/ Q8 u! s$ D/ nQUESTION 159 w* t1 A; x4 p0 f1 W
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two), c, }+ m O* X* x) q, f4 s
A. ARP spoofing
. I2 P- K g/ sB. exploits9 a# @& r7 h. \' C+ _
C. malware
( o, ?5 v7 Z! V5 P+ ~1 m/ s iD. eavesdropping
5 k) T% ]0 R: f3 H: x5 H7 B- E+ Y+ OE. denial-of-service attacks$ P! V6 |, ]; i" a
Correct Answer: BC
3 M+ L6 ?! V1 b9 _QUESTION 16
! ?& G1 ]6 w! v- W% ZWhat are two rootkit types? (Choose two)
& E" B" Z `! T, M( h% JA. bootloader. f* |/ o! m2 F+ x( t: R
B. buffer mode" a7 y7 b6 s/ Z: q% B. M) P: e/ i
C. registry( I& N% d9 ^! J9 T
D. virtual8 s( _* `! T! M/ O' h z4 |/ r
E. user mode# Q7 c5 U7 o% a3 R1 B, V9 ~
Correct Answer: A. e, l- K ]0 h5 @1 Z
QUESTION 171 F# K- P n) Q+ x
Which threat involves software being used to gain unauthorized access to a computer system?
# A( G& B* s2 U: f$ \7 LA. ping of death, u! \. A1 K ~4 K7 i
B. HTTP flood" r$ C! f6 @7 e! B
C. virus) M$ Z! B4 O, J; Z; C
D. NTP amplification
" @' q: q7 K+ N; MCorrect Answer: C
0 E( y: w3 |; x- n, F1 C9 a1 ]QUESTION 18
0 V) S d; f9 nElliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?- J5 f: b J+ U b+ t2 [4 ]
A. 3DES
6 ]. L, x+ W! r3 d+ vB. DES9 e- ~) g X) }
C. RSA
& d. D1 S d) m. W8 K2 U& H8 G! W0 sD. AES
( x3 t% `, k5 v5 s: X; I. n7 J9 d% x& r+ lCorrect Answer: C |
17#
2020-11-17 22:35:26
回复(0)
收起回复
|