单项选择题
Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()
A.Intrusion detection
B.Virtualization
C.Kiting
D.Cloning
点击查看答案
相关考题
-
单项选择题
WhichofthefollowingdescribesastaticNAT?()
A.A static NAT uses a one to many mapping.
B.A static NAT uses a many to one mapping.
C.A static NAT uses a many to many mapping.
D.A static NAT uses a one to one mapping. -
单项选择题
WhichofthefollowingencryptionmethodsisoftenusedalongwithL2TP?()
A.S/MIME
B.SSH
C.3DES
D.IPSec -
单项选择题
Whichofthefollowingspecifiesasetofconsistentrequirementsforaworkstationorserver?()
A.Vulnerability assessment
B.Imaging software
C.Patch management
D.Configuration baseline
