What is the most effective means of determining how controls are functioning within an operating system、
A.Interview with computer operator
B.Review of software control features and/or parameters
C.Review of operating system manual
D.Interview with product vendor
试卷相关题目
- 1If the computer system being used contains confidential information, users must not:
A.Leave their computer without first logging off.
B.Share their desks.
C.Encrypt their passwords.
D.Communicate
开始考试点击查看答案 - 2The ability to do something with a computer resource can be explicitly enabled or restricted through:
A.Physical and system-based controls.
B.Theoretical and system-based controls.
C.Mental and system-based controls.
D.Physical and trap-based controls.
开始考试点击查看答案 - 3Which of the following steps should be performed first in a business impact analysis (BIA)、
A.Identify all business units within an organization
B.Evaluate the impact of disruptive events
C.Estimate the Recovery Time Objectives (RTO)
D.Evaluate the criticality of business functions
开始考试点击查看答案 - 4are appropriate whenever the function required by the security program involves which of the following、
A.The use of discriminating judgment
B.The use of physical force
C.The operation of access control devices
D.The need to detect unauthorized access
开始考试点击查看答案 - 5数据备份常用的方式主要有:完全备份、增量备份和()。
A.逻辑备份
B.按需备份
C.差分备份
D.物理备份
开始考试点击查看答案 - 6of the following is the primary security feature of a proxy server、
A.Client hiding
B.URL blocking
C.Route blocking
D.Content filtering
开始考试点击查看答案 - 7Which of the following would constitute the best example of a password to use for access to a system by a network administrator、
A.holiday
B.Christmas12
C.Jenny&30
D.TrZc&45g
开始考试点击查看答案 - 8Which of the following OSI layers does not provide confidentiality、
A.Presentation
B.Network
C.Transport
D.Session
开始考试点击查看答案 - 9A firewall can be classified as a:
A.Directory based access control.
B.Rule based access control.
C.Lattice based access control.
D.ID based access control.
开始考试点击查看答案 - 10Which one of the following CANNOT be prevented by the Secure Shell (SSH) program、
A.Internet Protocol (IP) spoofing.
B.Data manipulation during transmissions.
C.Network based birthday attack.
D.Compromise of the source/destination host.
开始考试点击查看答案
最新试卷
企事业内部考试类其他其他积分换房
类别:招考类其它企事业内部考试类其他其他科目一法律法规知识
类别:招考类其它企事业内部考试类其他其他神东地测公司消防安全知识培训考试
类别:招考类其它企事业内部考试类其他其他硫化氢
类别:招考类其它企事业内部考试类其他其他矿山救护队理论500题多项选择题(100
类别:招考类其它企事业内部考试类其他其他矿山救护队理论500题单选题(100题)
类别:招考类其它企事业内部考试类其他其他矿山救护队理论500题判断题部分(100
类别:招考类其它企事业内部考试类其他其他矿井防尘工三基考试试题
类别:招考类其它企事业内部考试类其他其他矿井通风单选题
类别:招考类其它企事业内部考试类其他其他矿井维修钳工721 多选189题
类别:招考类其它