of the following is the primary security feature of a proxy server、
A.Client hiding
B.URL blocking
C.Route blocking
D.Content filtering
试卷相关题目
- 1What is the most effective means of determining how controls are functioning within an operating system、
A.Interview with computer operator
B.Review of software control features and/or parameters
C.Review of operating system manual
D.Interview with product vendor
开始考试点击查看答案 - 2If the computer system being used contains confidential information, users must not:
A.Leave their computer without first logging off.
B.Share their desks.
C.Encrypt their passwords.
D.Communicate
开始考试点击查看答案 - 3The ability to do something with a computer resource can be explicitly enabled or restricted through:
A.Physical and system-based controls.
B.Theoretical and system-based controls.
C.Mental and system-based controls.
D.Physical and trap-based controls.
开始考试点击查看答案 - 4Which of the following steps should be performed first in a business impact analysis (BIA)、
A.Identify all business units within an organization
B.Evaluate the impact of disruptive events
C.Estimate the Recovery Time Objectives (RTO)
D.Evaluate the criticality of business functions
开始考试点击查看答案 - 5are appropriate whenever the function required by the security program involves which of the following、
A.The use of discriminating judgment
B.The use of physical force
C.The operation of access control devices
D.The need to detect unauthorized access
开始考试点击查看答案 - 6Which of the following would constitute the best example of a password to use for access to a system by a network administrator、
A.holiday
B.Christmas12
C.Jenny&30
D.TrZc&45g
开始考试点击查看答案 - 7Which of the following OSI layers does not provide confidentiality、
A.Presentation
B.Network
C.Transport
D.Session
开始考试点击查看答案 - 8A firewall can be classified as a:
A.Directory based access control.
B.Rule based access control.
C.Lattice based access control.
D.ID based access control.
开始考试点击查看答案 - 9Which one of the following CANNOT be prevented by the Secure Shell (SSH) program、
A.Internet Protocol (IP) spoofing.
B.Data manipulation during transmissions.
C.Network based birthday attack.
D.Compromise of the source/destination host.
开始考试点击查看答案 - 10DNS, FTP, TFTP, SNMP are provided at what level of the OSI/ISO model、
A.Application
B.Network
C.Presentation
D.Transport
开始考试点击查看答案
最新试卷
企事业内部考试类其他其他积分换房
类别:招考类其它企事业内部考试类其他其他科目一法律法规知识
类别:招考类其它企事业内部考试类其他其他神东地测公司消防安全知识培训考试
类别:招考类其它企事业内部考试类其他其他硫化氢
类别:招考类其它企事业内部考试类其他其他矿山救护队理论500题多项选择题(100
类别:招考类其它企事业内部考试类其他其他矿山救护队理论500题单选题(100题)
类别:招考类其它企事业内部考试类其他其他矿山救护队理论500题判断题部分(100
类别:招考类其它企事业内部考试类其他其他矿井防尘工三基考试试题
类别:招考类其它企事业内部考试类其他其他矿井通风单选题
类别:招考类其它企事业内部考试类其他其他矿井维修钳工721 多选189题
类别:招考类其它