位置:首页 > 题库频道 > 其它分类 > 招考类其它 > 企事业内部考试类ITIT信息安全工程师测试题(35个选择题,5个简答题)

of the following is the primary security feature of a proxy server、

发布时间:2024-07-12

A.Client hiding

B.URL blocking

C.Route blocking

D.Content filtering

试卷相关题目

  • 1What is the most effective means of determining how controls are functioning within an operating system、

    A.Interview with computer operator

    B.Review of software control features and/or parameters

    C.Review of operating system manual

    D.Interview with product vendor

    开始考试点击查看答案
  • 2If the computer system being used contains confidential information, users must not:

    A.Leave their computer without first logging off.

    B.Share their desks.

    C.Encrypt their passwords.

    D.Communicate

    开始考试点击查看答案
  • 3The ability to do something with a computer resource can be explicitly enabled or restricted through:

    A.Physical and system-based controls.

    B.Theoretical and system-based controls.

    C.Mental and system-based controls.

    D.Physical and trap-based controls.

    开始考试点击查看答案
  • 4Which of the following steps should be performed first in a business impact analysis (BIA)、

    A.Identify all business units within an organization

    B.Evaluate the impact of disruptive events

    C.Estimate the Recovery Time Objectives (RTO)

    D.Evaluate the criticality of business functions

    开始考试点击查看答案
  • 5are appropriate whenever the function required by the security program involves which of the following、

    A.The use of discriminating judgment

    B.The use of physical force

    C.The operation of access control devices

    D.The need to detect unauthorized access

    开始考试点击查看答案
  • 6Which of the following would constitute the best example of a password to use for access to a system by a network administrator、

    A.holiday

    B.Christmas12

    C.Jenny&30

    D.TrZc&45g

    开始考试点击查看答案
  • 7Which of the following OSI layers does not provide confidentiality、

    A.Presentation

    B.Network

    C.Transport

    D.Session

    开始考试点击查看答案
  • 8A firewall can be classified as a:

    A.Directory based access control.

    B.Rule based access control.

    C.Lattice based access control.

    D.ID based access control.

    开始考试点击查看答案
  • 9Which one of the following CANNOT be prevented by the Secure Shell (SSH) program、

    A.Internet Protocol (IP) spoofing.

    B.Data manipulation during transmissions.

    C.Network based birthday attack.

    D.Compromise of the source/destination host.

    开始考试点击查看答案
  • 10DNS, FTP, TFTP, SNMP are provided at what level of the OSI/ISO model、

    A.Application

    B.Network

    C.Presentation

    D.Transport

    开始考试点击查看答案
返回顶部