单项选择题
Which method is of gaining access to a system that bypasses normal security measures?()
A.Starting a Smurf attack B.Conducting social engineering C.Creating a back door D.Launching a DoS attack
单项选择题 Whichoptionensuresthatdataisnotmodifiedintransit?()
单项选择题 WhichtypeofintrusionpreventiontechnologywillbeprimarilyusedbytheCiscoIPSsecurityappliances?()
单项选择题 WhenconfiguringSSH,whichistheCiscominimumrecommendedmodulusvalue?()