单项选择题
Which of the following security mitigation techniques is the MOST effective against zero-day attacks?()
A.Update antivirus definitions
B.MAC filtering
C.Effective security policies
D.User awareness training
点击查看答案
相关考题
-
单项选择题
A user reports that the wireless network is slow and is able to see and access shared folders that are unknown to the user. Which of the following is the cause of the problem?()
A.The SSID broadcast is disabled.
B.Wireless router is improperly configured.
C.The user is connecting to the wrong SSID
D.The wireless NIC is defective.
-
单项选择题
A second network card in a server that activates if the primary card fails is an example of which of the following network performance optimization?()
A.Load balancing
B.QoS
C.High availability
D.Fault tolerance -
单项选择题
Which of the following cables would a technician make in order to identify a physical interfaceproblem?()
A.Serial
B.Loopback
C.Rollover
D.Console
