阿摩線上測驗
登入
首頁
>
研究所、轉學考(插大)◆資訊安全概論
>
111年 - [無官方正解]111 國立清華大學碩士班考試入學試題_資訊安全研究所:資訊安全#130742
> 試題詳解
26.NIPS is considered a_________type of control.
(A) detective
(B) preventative
(C) network
(D) host
答案:
登入後查看
統計:
A(1), B(0), C(0), D(0), E(0) #3557268
詳解 (共 1 筆)
CCC
B1 · 2025/09/06
#6645976
(A) detective(B) pr...
(共 192 字,隱藏中)
前往觀看
0
0
相關試題
1. Which of the following web application attacks are caused by compromising a vulnerable web site and uploading malicious code or using malicious links to get a user's sensitive information?(A)CSRF attack(B) XSS attack(C) Injection attack(D) Defacing attack
#3557243
複選題2. Which of the following could make a web application vulnerable to an XSS attack? (hoose two.)(A) Weak encryption algorithm(B) Use of Flash, VBScript, or JavaScript(C) Malformed HTML requests(D) Malformed TCP segments
#3557244
3. Which of the following are small files located on a host that contain session information about visited web sites?(A)Cookies(B) html files(C) Session keys(D) Applets
#3557245
4. What types of applications do local shared objects support?(A)Java applets(B) Operating system executable files(C) Microsoft Office content(D) Adobe Flash content
#3557246
5.ll of the following are mitigations against HTML attachment attacks, except:(A) Stripping e-mail attachments containing HTML files(B) Encrypting HTML attachments during transmission(C) Preventing Internet connections from HTML attachments(D) Cautioning users not to click HTML attachments
#3557247
6. Manipulating______________is one way to embed malicious commands and directives into HTTP traffic sent back and forth between a client and web server.(A)request packets(B) response segments(C) HTTP headers(D) flash cookies
#3557248
7. Which network device is used to send traffic to different physical networks, based upon logical addressing? (A)Router (B) Switch (C) Load balancer (D) Firewall
#3557249
8. Which type of device is used to provide network protection and security bypreventing hosts from connecting to the organization's infrastructure unless they meetcertain criteria?(A)Switch(B) NAT device(C) Firewall(D) NAC device
#3557250
9. You need to install a new network for a customer, and you are looking at different ways to design the perimeter network and entry points. You determine that you will need a firewall, border router, and two separate network segments off of the firewall for Internet-accessible-servers. Which one of the following architectures best describes your network design? (A)Bastion host (B) VLAN (C) DMZ (D) Subnetwork
#3557251
10. Which of the following statements is true about subnetting?(A)Adding network bits to the subnet mask creates more networks but fewer hosts.(B) Adding network bits to the subnet mask creates more networks and hosts.(C) Adding host bits to the subnet masks creates more networks but fewer hosts.(D) Adding host bits to the subnet masks creates more hosts and networks.
#3557252
相關試卷
114年 - 114 教育部公費留學考試試題:資訊安全概論#135195
2025 年 · #135195
113年 - [無官方正解]113 國立清華大學_碩士班考試入學試題:資訊安全#130695
2024 年 · #130695
113年 - 113 教育部公費留學考試試題:資訊安全概論#125716
2024 年 · #125716
112年 - [無官方正解]112 國立清華大學碩士班考試入學試題_資訊安全研究所:資訊安全#130782
2023 年 · #130782
112年 - 112 教育部公費留學考試試題:資訊安全概論#125717
2023 年 · #125717
111年 - [無官方正解]111 國立清華大學碩士班考試入學試題_資訊安全研究所:資訊安全#130742
2022 年 · #130742
111年 - 111 教育部_公費留學考試:資訊安全概論#125712
2022 年 · #125712
110年 - [無官方正解]109 國立清華大學_碩士班考試入學試題_資訊安全研究所:資訊安全#130996
2021 年 · #130996
110年 - 110 教育部公費留學考試試題:資訊安全概論#125719
2021 年 · #125719
110年 - 110 國立清華大學碩士班考試入學試題_資訊安全研究所:資訊安全#105636
2021 年 · #105636