A.scanning streaming media for malware
B.scanning multiple downloads at the same time
C.passing pieces of a download to the client while the download is being scanned
D.passing scanned pieces of the file between two different malware-scanning engines
您可能感興趣的試卷
你可能感興趣的試題
A.a list of proxy servers that are to be bypassed
B.a list of clients and destinations that will bypass the proxy in transparent mode
C.a list of clients and destinations that will bypass the proxy in explicit forward mode
D.a list of user agents exempt from authentication
A.client reports will display authenticated usernames
B.client reports will display both the username and IP address of the clients
C.client reports are not affected by authentication
D.client reports will display the IP address of the authentication server
最新試題
What are PAC files used for?()
Match the log file with its role in troubleshooting.
Match the troubleshooting tool with one of its features or functions.
Which statement is true?()
Which of these is a suspect user agent?()
Which of the following is NOT provided by AVC?()
Put the following features in the order they are applied.
What is a benefit of NTLMSSP over basic authentication?()
Which of these is a drawback in using McAfee heuristic scanning?()
In AsyncOS 7.0 for web the choice of Authentication Surrogate is?()