Which software-based security threat is typically spread from user to user via e-mail?()A.Data interceptionB.VirusC.Trojan horseD.Denial of service

题目
Which software-based security threat is typically spread from user to user via e-mail?()

A.Data interception

B.Virus

C.Trojan horse

D.Denial of service


相似考题
更多“Which software-based security threat is typically spread from user to user via e-mail?() ”相关问题
  • 第1题:

    Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?()

    A.REVOKE ALL PRIVILEGES FROM USER tom

    B.REVOKE ALL ON EMPLOYEE FROM USER tom

    C.REVOKE EXECUTE ON EMPLOYEE FROM USER tom

    D.REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom


    参考答案:B

  • 第2题:

    Users of your web application have requested that they should be able to set the duration of their sessions.So for example, one user might want a webapp to stay connected for an hour rather than the webapp’sdefault of fifteen minutes; another user might want to stay connected for a whole day. Furthermore, youhave a special login servlet that performs user authentication and retrieves the User object from the database. You want to augment this code to set up the user’s specified session duration. Which codesnippet in the login servlet will accomplish this goal?()

    • A、User user = // retrieve the User object from the database session.setDurationInterval(user.getSessionDuration());
    • B、User user = // retrieve the User object from the database session.setMaxDuration(user.getSessionDuration());
    • C、User user = // retrieve the User object from the database session.setInactiveInterval(user.getSessionDuration());
    • D、User user=//retrieve the User object from the database session.setDuration(user.getSessionDuratio());
    • E、User user = // retrieve the User object from the database session.setMaxInactiveInterval(user.getSessionDuration());

    正确答案:E

  • 第3题:

    Which of the following statements is used to prevent user TOM from adding and deleting data in table TAB1?()

    • A、REVOKE ADD, DELETE FROM USER tom ON TABLE tab1
    • B、REVOKE ADD, DELETE ON TABLE tab1 FROM USER tom
    • C、REVOKE INSERT, DELETE FROM USER tom ON TABLE tab1
    • D、REVOKE INSERT, DELETE ON TABLE tab1 FROM USER tom

    正确答案:D

  • 第4题:

    Which of the following statements allows USER1 to take away read access on the table ORG.TAB1 from USER2?()

    • A、REVOKE SELECT FROM user2 ON TABLE org.tab1
    • B、REVOKE SELECT ON TABLE org.tab1 FROM user2
    • C、REVOKE READ ACCESS FROM user2 ON TABLE org.tab1
    • D、REVOKE READ ACCESS ON TABLE org.tab1 FROM user2

    正确答案:B

  • 第5题:

    Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?()

    • A、REVOKE ALL PRIVILEGES FROM USER tom
    • B、REVOKE ALL ON EMPLOYEE FROM USER tom
    • C、REVOKE EXECUTE ON EMPLOYEE FROM USER tom
    • D、REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom

    正确答案:B

  • 第6题:

    Which two statements are true regarding firewall user authentication?()

    • A、When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
    • B、When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
    • C、If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.
    • D、If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

    正确答案:B,C

  • 第7题:

    Your network contains an Active Directory domain named contoso.com. The domain contains 20 computer accounts in an organizational unit (OU) named OU1. A user account named User1 is in an OU named OU2.You are configuring a Group Policy object (GPO) named GPO1. You need to assign User1 the Backup files and directories user right to all of the computer accounts in OU1.Which two actions should you perform?()

    • A、Link GPO1 to OU1
    • B、Link GPO1 to OU2.
    • C、Modify the Delegation settings of GPO1.
    • D、From User Configuration in GPO1, modify the security settings.
    • E、From Computer Configuration in GPO1, modify the security settings

    正确答案:A,E

  • 第8题:

    You have a computer named Computer1 that runs Windows 7. Computer1 has a shared printer. You needto configure Computer1 so that only Administrators are authorized to shut down the computer.  What should you do?()

    • A、From User Accounts, modify the user profiles settings.
    • B、From User Accounts, modify the User Account Control (UAC) settings.
    • C、From the local computer policy, modify the Security Options.
    • D、From the local computer policy, modify the User Rights Assignment.

    正确答案:D

  • 第9题:

    单选题
    Users of your web application have requested that they should be able to set the duration of their sessions.So for example, one user might want a webapp to stay connected for an hour rather than the webapp’sdefault of fifteen minutes; another user might want to stay connected for a whole day. Furthermore, youhave a special login servlet that performs user authentication and retrieves the User object from the database. You want to augment this code to set up the user’s specified session duration. Which codesnippet in the login servlet will accomplish this goal?()
    A

    User user = // retrieve the User object from the database session.setDurationInterval(user.getSessionDuration());

    B

    User user = // retrieve the User object from the database session.setMaxDuration(user.getSessionDuration());

    C

    User user = // retrieve the User object from the database session.setInactiveInterval(user.getSessionDuration());

    D

    User user=//retrieve the User object from the database session.setDuration(user.getSessionDuratio());

    E

    User user = // retrieve the User object from the database session.setMaxInactiveInterval(user.getSessionDuration());


    正确答案: E
    解析: 暂无解析

  • 第10题:

    多选题
    Which two statements are true regarding firewall user authentication?()
    A

    When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.

    B

    When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.

    C

    If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.

    D

    If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.


    正确答案: B,C
    解析: 暂无解析

  • 第11题:

    单选题
    You have an Exchange Server 2010 organization.A user named User1 connects to his mailbox by using Microsoft Office Outlook.User1 reports that he is unable to send encrypted e-mail messages to an external recipient named User2.You verify that User1 and User2 have e-mail encryption certificates.You need to ensure that User1 can send encrypted e-mail messages to User2.What should you do first?()
    A

    Instruct User2 to add a delegate

    B

    Instruct User2 to send a signed e-mail message to User1.

    C

    Instruct User1 to send a signed e-mail message to User2.

    D

    Instruct User1 to modify the sensitivity settings of the e-mail message


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    A user works daily with video production and needs portable storage which will allow them to transport their work back and forth from home. Taking the users storage and bandwidth requirements into consideration, which of the following would BEST suit the users needs?()
    A

    An external hard drive connected via eSATA

    B

    An external hard drive connected via USB 2.0

    C

    An external hard drive connected via serial

    D

    A thumb drive connected via USB 2.0


    正确答案: A
    解析: 暂无解析

  • 第13题:

    A user works daily with video production and needs portable storage which will allow them to transport their work back and forth from home. Taking the users storage and bandwidth requirements into consideration, which of the following would BEST suit the users needs?()

    • A、An external hard drive connected via eSATA
    • B、An external hard drive connected via USB 2.0
    • C、An external hard drive connected via serial
    • D、A thumb drive connected via USB 2.0

    正确答案:A

  • 第14题:

    Which two statements are true regarding firewall user authentication?() (Choose two.)

    • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
    • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
    • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
    • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

    正确答案:B,C

  • 第15题:

    Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()

    • A、REVOKE ACCESS ON DATABASE FROM USER bob
    • B、REVOKE CONNECT ON DATABASE FROM USER tom
    • C、REVOKE tom FROM ACCESS ON DATABASE BY USER bob
    • D、REVOKE tom FROM CONNECT ON DATABASE BY USER bob

    正确答案:B

  • 第16题:

    An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()

    • A、As the root user from serverA run the command rhost serverB
    • B、As the root user from serverA run the command rlogin serverB
    • C、As the desired user from serverB run the command rhost serverA
    • D、As the desired user from serverA run the command rlogin serverB

    正确答案:D

  • 第17题:

    What information does the Junos Pulse Access Control Service provide to Security Threat Response Manager (STRM)?()

    • A、Session length
    • B、User browser information
    • C、Session IP address
    • D、User identity information

    正确答案:C,D

  • 第18题:

    You are designing a strategy for migrating the UNIX user accounts to Active Directory.  Which three actions should you perform?()

    • A、 Import the user accounts as inetOrgPerson objects.
    • B、 Import the user accounts into Active Directory by using the Ldifde command-line tool.
    • C、 Export all user accounts from the UNIX servers to a text file.
    • D、 Export all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.
    • E、 Assign random passwords to each user object, and securely distribute the password to the users.
    • F、 Create the same strong password for each user object, and require users to change their passwords at first logon.
    • G、 Instruct users to use the same name and password as they used on the UNIX servers.

    正确答案:B,C,F

  • 第19题:

    You need to receive an e-mail message whenever a domain user account is locked out.   Which tool should you use()

    • A、Active Directory Administrative Center
    • B、Event Viewer
    • C、Resource Monitor
    • D、Security Configuration Wizard

    正确答案:B

  • 第20题:

    多选题
    You are designing a strategy for migrating the UNIX user accounts to Active Directory. Which three actions should you perform?()
    A

    Import the user accounts as inetOrgPerson objects.

    B

    Import the user accounts into Active Directory by using the Ldifde command-line tool.

    C

    Export all user accounts from the UNIX servers to a text file.

    D

    Export all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.

    E

    Assign random passwords to each user object, and securely distribute the password to the users.

    F

    Create the same strong password for each user object, and require users to change their passwords at first logon.


    正确答案: A,C
    解析: 暂无解析

  • 第21题:

    单选题
    Which statement accurately describes firewall user authentication?()
    A

    Firewall user authentication provides another layer of security in a network.

    B

    Firewall user authentication provides a means for accessing a JUNOS Software-based security device.

    C

    Firewall user authentication enables session-based forwarding.

    D

    Firewall user authentication is used as a last resort security method in a network.


    正确答案: A
    解析: 暂无解析

  • 第22题:

    多选题
    Which two statements are true regarding firewall user authentication?() (Choose two.)
    A

    When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.

    B

    When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.

    C

    If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .

    D

    If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.


    正确答案: D,A
    解析: 暂无解析

  • 第23题:

    单选题
    Which software-based security threat is typically spread from user to user via e-mail?()
    A

    Data interception

    B

    Virus

    C

    Trojan horse

    D

    Denial of service


    正确答案: A
    解析: 暂无解析