位置:首页 > 题库频道 > 其它分类 > 招考类其它 > 企事业内部考试类ITIT信息安全工程师测试题(35个选择题,5个简答题)

What is the most effective means of determining how controls are functioning within an operating system、

发布时间:2024-07-12

A.Interview with computer operator

B.Review of software control features and/or parameters

C.Review of operating system manual

D.Interview with product vendor

试卷相关题目

  • 1If the computer system being used contains confidential information, users must not:

    A.Leave their computer without first logging off.

    B.Share their desks.

    C.Encrypt their passwords.

    D.Communicate

    开始考试点击查看答案
  • 2The ability to do something with a computer resource can be explicitly enabled or restricted through:

    A.Physical and system-based controls.

    B.Theoretical and system-based controls.

    C.Mental and system-based controls.

    D.Physical and trap-based controls.

    开始考试点击查看答案
  • 3Which of the following steps should be performed first in a business impact analysis (BIA)、

    A.Identify all business units within an organization

    B.Evaluate the impact of disruptive events

    C.Estimate the Recovery Time Objectives (RTO)

    D.Evaluate the criticality of business functions

    开始考试点击查看答案
  • 4are appropriate whenever the function required by the security program involves which of the following、

    A.The use of discriminating judgment

    B.The use of physical force

    C.The operation of access control devices

    D.The need to detect unauthorized access

    开始考试点击查看答案
  • 5数据备份常用的方式主要有:完全备份、增量备份和()。

    A.逻辑备份

    B.按需备份

    C.差分备份

    D.物理备份

    开始考试点击查看答案
  • 6of the following is the primary security feature of a proxy server、

    A.Client hiding

    B.URL blocking

    C.Route blocking

    D.Content filtering

    开始考试点击查看答案
  • 7Which of the following would constitute the best example of a password to use for access to a system by a network administrator、

    A.holiday

    B.Christmas12

    C.Jenny&30

    D.TrZc&45g

    开始考试点击查看答案
  • 8Which of the following OSI layers does not provide confidentiality、

    A.Presentation

    B.Network

    C.Transport

    D.Session

    开始考试点击查看答案
  • 9A firewall can be classified as a:

    A.Directory based access control.

    B.Rule based access control.

    C.Lattice based access control.

    D.ID based access control.

    开始考试点击查看答案
  • 10Which one of the following CANNOT be prevented by the Secure Shell (SSH) program、

    A.Internet Protocol (IP) spoofing.

    B.Data manipulation during transmissions.

    C.Network based birthday attack.

    D.Compromise of the source/destination host.

    开始考试点击查看答案
返回顶部