- 积分
- 88
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 最后登录
- 1970-1-1
- 阅读权限
- 20
- 听众
- 收听
助理工程师
 
|

楼主 |
发表于 2020-11-17 22:35:26
|
显示全部楼层
QUESTION 148 _; |+ [; W5 l- s) j. W. A$ T
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP- l x0 x: X# t9 \+ d3 [" v
commands to perform file retrieval from the server?- B6 ?- G2 y" \7 p4 z6 x
A. profile
9 D0 S* K1 S, M& O0 c) y8 _$ ?B. url$ M2 B- ?4 p, M# F( L% \
C. terminal
& H* H3 k$ y3 T- ?& p$ HD. selfsigned+ F+ ?2 j2 ~& S9 D
Correct Answer: A
4 A: _/ [# i& W$ P1 Y' O/ nQUESTION 15# w0 ~ u8 e; r! a4 N
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)
+ a, L8 P7 q6 c- QA. ARP spoofing c5 i4 H8 H& [ \) j
B. exploits& A C2 m0 p7 }6 C
C. malware4 m% _+ N. i( m. A: h# k) h
D. eavesdropping
" j& D, F- h% ?! ~' l' O ZE. denial-of-service attacks
3 x- B) y# N, ^0 UCorrect Answer: BC( n7 E, i5 C B* [$ P- v, Q
QUESTION 16
2 F b$ ]* a8 b, Y. }5 [What are two rootkit types? (Choose two)! o" J1 f. a' T5 Z2 F7 m8 y
A. bootloader Q5 i% n1 E+ F) `% g7 b
B. buffer mode
& _* S5 x0 F* WC. registry
) j5 I$ ^ |! s8 g! ^D. virtual! s$ x& C2 @9 e6 A) u
E. user mode' I2 o) e% {8 S' X+ l3 `4 a( l
Correct Answer: A
0 ~1 I& m' A! G5 {8 x e" H# cQUESTION 17 K% ?/ \! _2 Q7 a+ {. i1 b7 B
Which threat involves software being used to gain unauthorized access to a computer system?
- }0 Q8 s: S9 o; P9 hA. ping of death
! X! I7 g1 c0 g CB. HTTP flood5 o1 s8 [0 d- P$ X. k3 |0 {0 C
C. virus
1 _6 l, d3 c# {- L$ S3 KD. NTP amplification3 J' O) C3 M8 l
Correct Answer: C
: P! U2 V, P8 A0 ? ZQUESTION 18
" h2 _& s$ G H, ZElliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?" g- A) ^7 M& M" r( }3 [9 J
A. 3DES
m4 y3 P+ f- M/ L8 w' S P. AB. DES5 `* e7 R' W H8 V6 X n9 y J+ a
C. RSA
: P* N( h# h3 E3 J4 LD. AES! q [/ L% ~, d$ S0 ?8 ?
Correct Answer: C |
17#
2020-11-17 22:35:26
回复(0)
收起回复
|