位置:首页 > 题库频道 > 其它分类 > 招考类其它 > 企事业内部考试类ITIT信息安全工程师测试题(35个选择题,5个简答题)

Which of the following steps should be performed first in a business impact analysis (BIA)、

发布时间:2024-07-12

A.Identify all business units within an organization

B.Evaluate the impact of disruptive events

C.Estimate the Recovery Time Objectives (RTO)

D.Evaluate the criticality of business functions

试卷相关题目

  • 1are appropriate whenever the function required by the security program involves which of the following、

    A.The use of discriminating judgment

    B.The use of physical force

    C.The operation of access control devices

    D.The need to detect unauthorized access

    开始考试点击查看答案
  • 2数据备份常用的方式主要有:完全备份、增量备份和()。

    A.逻辑备份

    B.按需备份

    C.差分备份

    D.物理备份

    开始考试点击查看答案
  • 3审计管理指:

    A.保证数据接收方收到的信息与发送方发送的信息完全一致

    B.防止因数据被截获而造成的泄密

    C.对用户和程序使用资源的情况进行记录和审查

    D.保证信息使用者都可有得到相应授权的全部服务

    开始考试点击查看答案
  • 4Windows系统的安全日志通过以下那个工具设置。

    A.事件查看器

    B.服务管理器

    C.本地安全策略

    D.网络适配器属性

    开始考试点击查看答案
  • 5公司的局域网使用的是Windows主机,网络管理员要则试与IP地址为 192.168.1.10的主机是否连通,同时得到该主机的主机名,可以使用()命令。

    A.ping 192.168.1.10

    B.ping –t 192.168.1.10

    C.ping –h 192.168.1.10

    D.ping –a 192.168.1.10

    开始考试点击查看答案
  • 6The ability to do something with a computer resource can be explicitly enabled or restricted through:

    A.Physical and system-based controls.

    B.Theoretical and system-based controls.

    C.Mental and system-based controls.

    D.Physical and trap-based controls.

    开始考试点击查看答案
  • 7If the computer system being used contains confidential information, users must not:

    A.Leave their computer without first logging off.

    B.Share their desks.

    C.Encrypt their passwords.

    D.Communicate

    开始考试点击查看答案
  • 8What is the most effective means of determining how controls are functioning within an operating system、

    A.Interview with computer operator

    B.Review of software control features and/or parameters

    C.Review of operating system manual

    D.Interview with product vendor

    开始考试点击查看答案
  • 9of the following is the primary security feature of a proxy server、

    A.Client hiding

    B.URL blocking

    C.Route blocking

    D.Content filtering

    开始考试点击查看答案
  • 10Which of the following would constitute the best example of a password to use for access to a system by a network administrator、

    A.holiday

    B.Christmas12

    C.Jenny&30

    D.TrZc&45g

    开始考试点击查看答案
返回顶部