Pre-Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

PDF H12-731_V2.0 Study Guide

Page: 9 / 10
Total 276 questions

HCIE-Security (Written) V2.0 Questions and Answers

Question 33

The global nature of the Internet exposes Teb services to attacks of varying sizes, sizes, and sophistications So which of the following options can secure Web services?

Options:

A.

run IIS Lockdown Wizzard

B.

Install the latest operating system patches

C.

Disable default and management of web sites

D.

Disable network printing

Question 34

If the attacker uses a fake address to launch a TCP flood attack Which of the following defenses is most effective? (single).

Options:

A.

Source verification

B.

Fingerprint learning

C.

Session checking

D.

Load inspection

Question 35

Common database security audit techniques according to technical characteristics What are the categories that can be divided into? (multiple selection).

Options:

A.

Agent-based audit technology

B.

Log-based estimation technology

C.

Gateway-based audit technology

D.

Audit technology based on network monitoring

Question 36

A backdoor is a hacking method that obtains access to a program or system from a relatively stealthy channel But it does not overrule the security controls of the software.

Options:

A.

TRUE

B.

FALSE

Page: 9 / 10
Total 276 questions