位置:首页 > 题库频道 > 其它分类 > 招考类其它 > 企事业内部考试类ITIT信息安全工程师测试题(35个选择题,5个简答题)

The following are fire detector types EXCEPT:

发布时间:2024-07-12

A.smoke activated

B.flame actuated

C.acoustical-seismic detection system

D.heat activated

试卷相关题目

  • 1DNS, FTP, TFTP, SNMP are provided at what level of the OSI/ISO model、

    A.Application

    B.Network

    C.Presentation

    D.Transport

    开始考试点击查看答案
  • 2Which one of the following CANNOT be prevented by the Secure Shell (SSH) program、

    A.Internet Protocol (IP) spoofing.

    B.Data manipulation during transmissions.

    C.Network based birthday attack.

    D.Compromise of the source/destination host.

    开始考试点击查看答案
  • 3A firewall can be classified as a:

    A.Directory based access control.

    B.Rule based access control.

    C.Lattice based access control.

    D.ID based access control.

    开始考试点击查看答案
  • 4Which of the following OSI layers does not provide confidentiality、

    A.Presentation

    B.Network

    C.Transport

    D.Session

    开始考试点击查看答案
  • 5Which of the following would constitute the best example of a password to use for access to a system by a network administrator、

    A.holiday

    B.Christmas12

    C.Jenny&30

    D.TrZc&45g

    开始考试点击查看答案
  • 6Virtual Private Network software typically encrypts all of the following EXCEPT

    A.File transfer protocol

    B.Data link messaging

    C.HTTP protocol

    D.Session information

    开始考试点击查看答案
  • 7In a change control environment, which one of the following REDUCES the assurance of proper changes to source programs in production status、

    A.Authorization of the change.

    B.Testing of the change.

    C.Programmer access.

    D.Documentation of the chang

    开始考试点击查看答案
  • 8Which of the following is an ip address that is private (i.e. reserved for internal networks, and not a valid address to use on the Internet、

    A.192.168.42.5

    B.192.166.42.5

    C.192.175.42.5

    D.172.1.42.5

    开始考试点击查看答案
  • 9The absence or weakness in a system that may possibly be exploited is called a(n)、

    A.Threat

    B.Exposure

    C.Vulnerability

    D.Risk

    开始考试点击查看答案
  • 10What the protocol does “Ping” command use、

    A.Http

    B.Https

    C.SNMP

    D.ICMP

    开始考试点击查看答案
返回顶部