位置:首页 > 题库频道 > 其它分类 > 招考类其它 > 企事业内部考试类ITIT信息安全工程师测试题(35个选择题,5个简答题)

The absence or weakness in a system that may possibly be exploited is called a(n)、

发布时间:2024-07-12

A.Threat

B.Exposure

C.Vulnerability

D.Risk

试卷相关题目

  • 1Which of the following is an ip address that is private (i.e. reserved for internal networks, and not a valid address to use on the Internet、

    A.192.168.42.5

    B.192.166.42.5

    C.192.175.42.5

    D.172.1.42.5

    开始考试点击查看答案
  • 2In a change control environment, which one of the following REDUCES the assurance of proper changes to source programs in production status、

    A.Authorization of the change.

    B.Testing of the change.

    C.Programmer access.

    D.Documentation of the chang

    开始考试点击查看答案
  • 3Virtual Private Network software typically encrypts all of the following EXCEPT

    A.File transfer protocol

    B.Data link messaging

    C.HTTP protocol

    D.Session information

    开始考试点击查看答案
  • 4The following are fire detector types EXCEPT:

    A.smoke activated

    B.flame actuated

    C.acoustical-seismic detection system

    D.heat activated

    开始考试点击查看答案
  • 5DNS, FTP, TFTP, SNMP are provided at what level of the OSI/ISO model、

    A.Application

    B.Network

    C.Presentation

    D.Transport

    开始考试点击查看答案
  • 6What the protocol does “Ping” command use、

    A.Http

    B.Https

    C.SNMP

    D.ICMP

    开始考试点击查看答案
  • 7What is the protocol does email system use、

    A.SMTP

    B.Telnet

    C.TLS

    D.IMAP

    开始考试点击查看答案
返回顶部