In addition to Human Resources, with what company function must the collection of physical evidence be coordinated if an employee is suspected? 当一个员工受到怀疑时,除了人力资源部门,哪个公司职能应协作收集物理证据?()A、Industrial Security 工业安全B、Legal 法务C、Public Relations 公共关系D、External Aud

题目

In addition to Human Resources, with what company function must the collection of physical evidence be coordinated if an employee is suspected? 当一个员工受到怀疑时,除了人力资源部门,哪个公司职能应协作收集物理证据?()

  • A、Industrial Security 工业安全
  • B、Legal 法务
  • C、Public Relations 公共关系
  • D、External Audit Group 外部审计团体

相似考题
更多“In addition to Human Resources, with what company function must the collection of physical evidence be coordinated if an employee is suspected? 当一个员工受到怀疑时,除了人力资源部门,哪个公司职能应协作收集物理证据?()A、Industrial Security 工业安全B、Legal 法务C、Public Relations 公共关系D、External Aud”相关问题
  • 第1题:

    Human resource management is the management of human resources. It is a function in organization designed to maximize employee ( )in service of an employer’s strategic objectives.

    A.work
    B. joB.
    C.scope
    D.performance

    答案:D
    解析:
    翻译:人力资源管理就是对人力资源进行管理,目的是最大限度地发挥员工的表现力来为雇主实现战略目标。A.工作 B.职位 C.范围 D.表现力

  • 第2题:

    In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization (授权).
    An access control mechanism (71) between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is (72) to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(73)access. An auditing function monitors and keeps a record of user accesses to system resources.
    In practice, a number of(74)may cooperatively share the access control function. All operating systems have at least a rudimentary(基本的), and in many cases a quite robust, access control component. Add-on security packages can add to the(75)access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services.

    A.open
    B.monitor
    C.grant
    D.seek

    答案:C
    解析:
    在物理安全和信息安全领域,访问控制是对一个地方或其他资源的访问限制。访问的行为可能意味着消费、输入或使用。允许访问资源被称为授权。
    访问控制机制连接用户(代表用户执行的进程)和系统资源(如应用程序、操作系统、防火墙、路由器、文件和数据库)之间的连接。系统必须首先对用户进行身份验证。通常,身份验证功能决定用户是否被允许访问系统。然后,访问控制功能决定是否允许该用户指定的访问权限。安全管理员维护一个授权数据库,该数据库指定允许该用户访问哪些资源的类型。访问控制函数咨询此数据库以确定是否授予访问权。审计功能监视并保存用户访问系统资源的记录。
    在实践中,一些用户可以合作共享访问控制函数。所有操作系统都至少有一个基本的,而且在许多情况下是一个相当健壮的访问控制组件。附加安全包可以添加到操作系统的自动访问控制功能。特定的应用程序或实用程序,如数据库管理系统,也包括访问控制功能。外部设备,如防火墙,也可以提供访问控制服务。

  • 第3题:

    In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization (授权).
    An access control mechanism (71) between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is (72) to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(73)access. An auditing function monitors and keeps a record of user accesses to system resources.
    In practice, a number of(74)may cooperatively share the access control function. All operating systems have at least a rudimentary(基本的), and in many cases a quite robust, access control component. Add-on security packages can add to the(75)access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services.

    A.remote
    B.native
    C.controlled
    D.automated

    答案:D
    解析:
    在物理安全和信息安全领域,访问控制是对一个地方或其他资源的访问限制。访问的行为可能意味着消费、输入或使用。允许访问资源被称为授权。
    访问控制机制连接用户(代表用户执行的进程)和系统资源(如应用程序、操作系统、防火墙、路由器、文件和数据库)之间的连接。系统必须首先对用户进行身份验证。通常,身份验证功能决定用户是否被允许访问系统。然后,访问控制功能决定是否允许该用户指定的访问权限。安全管理员维护一个授权数据库,该数据库指定允许该用户访问哪些资源的类型。访问控制函数咨询此数据库以确定是否授予访问权。审计功能监视并保存用户访问系统资源的记录。
    在实践中,一些用户可以合作共享访问控制函数。所有操作系统都至少有一个基本的,而且在许多情况下是一个相当健壮的访问控制组件。附加安全包可以添加到操作系统的自动访问控制功能。特定的应用程序或实用程序,如数据库管理系统,也包括访问控制功能。外部设备,如防火墙,也可以提供访问控制服务。

  • 第4题:

    Who should DECIDE how a company should approach security and what security measures should be implemented?谁应该决定一个公司应该如何对待安全以及实施什么样的安全措施?()

    • A、Data owner 数据拥有者
    • B、Auditor 审计员
    • C、The information security specialist 信息安全专家
    • D、Senior management 高级管理者

    正确答案:D

  • 第5题:

    公共关系的英文是()

    • A、Public Relations
    • B、Public Relation
    • C、Publication Relations

    正确答案:A

  • 第6题:

    Given an EL function declared with:11.  12.spin 13.com.example.Spinner 14. 15.java.lang.String spinIt() 16. 17. Which two are true?()

    • A、The function method must have the signature: public String spin().
    • B、The method must be mapped to the logical name "spin" in the web.xml file.
    • C、The function method must have the signature: public String spinIt().
    • D、The function method must have the signature public static String spin().
    • E、The function method must have the signature: public static String spinIt().
    • F、The function class must be named Spinner, and must be in the package com.example.

    正确答案:E,F

  • 第7题:

    You have an Exchange Server 2010 organization.  You have a global security group named Legal that contains all the members of your companys legaldepartment.  The companys security policy states that the Legal group must be able to search all mailboxes for e-mailmessages that contain specific keywords.  You need to recommend a solution for the organization that complies with the security policy.  What should you include in the solution?()

    • A、a Discovery Management role group
    • B、a legal hold
    • C、administrator audit logging
    • D、Mailbox journaling

    正确答案:A

  • 第8题:

    You have an Exchange Server 2010 organization.  You plan to deploy a public folder access solution to meet the following requirements: .Users in the legal department must be able to send e-mail messages to public folders  .Users in the legal department must not be able to read documents in the public folders by using OutlookWeb App (OWA) You need to recommend changes to public folder access that meet the company requirements. What should you recommend?()

    • A、mail-enabled public folders and Editor permissions
    • B、mail-enabled public folders and Contributor permissions
    • C、OWA segmentation and Reviewer permissions
    • D、OWA segmentation and Send As permissions

    正确答案:B

  • 第9题:

    You are a security administrator for your company. The network consists of three Active Directory domains. All Active Directory domains are running at a Windows Server 2003 mode functionality level.    Employees in the editorial department of your company need access to resources on file servers that are in each of the Active Directory domains. Each Active Directory domain in the company contains at least one editorial department employee user account.    You need to create a single group named Company Editors that contains all editorial department employee user accounts and that has access to the resources on file server computers.  What should you do?()

    • A、 Create a global distribution group in the forest root domain and name it Company Editors.
    • B、 Create a global security group in the forest root domain and name it Company Editors.
    • C、 Create a universal distribution group in the forest root domain and name it Company Editors. 
    • D、 Create a universal security group in the forest root domain and name it Company Editors.

    正确答案:D

  • 第10题:

    单选题
    What is the function of Host Checker?()
    A

    To allow clientless access to the network

    B

    To restrict access to protected resources on the network

    C

    To scan an endpointfor compliance with security policies

    D

    To push a firewall policy to the endpoint's local firewall application


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    You have an Exchange Server 2010 organization for a company named Contoso, Ltd. Contoso has the following security policy: .Messages that contain the word budget cannot be sent to external recipients.Messages that contain the name Northwind Traders must be sent to the legal department automaticallyYou need to recommend a solution to meet the security policy. What should you recommend?()
    A

    Create two transport rules.

    B

    Create two message classifications.

    C

    Create one transport rule and configure a legal hold.

    D

    Create one message classification and configure a legal hold.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    You are a security administrator for your company. The network consists of three Active Directory domains. All Active Directory domains are running at a Windows Server 2003 mode functionality level.    Employees in the editorial department of your company need access to resources on file servers that are in each of the Active Directory domains. Each Active Directory domain in the company contains at least one editorial department employee user account.    You need to create a single group named Company Editors that contains all editorial department employee user accounts and that has access to the resources on file server computers.  What should you do?()
    A

     Create a global distribution group in the forest root domain and name it Company Editors.

    B

     Create a global security group in the forest root domain and name it Company Editors.

    C

     Create a universal distribution group in the forest root domain and name it Company Editors. 

    D

     Create a universal security group in the forest root domain and name it Company Editors.


    正确答案: C
    解析: 暂无解析

  • 第13题:

    In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming,entering, or using. Permission to access a resource is called authorization(授权).An access control mechanism( )between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls; routers, files,and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is ( ) to access the system at all.Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to( ) access. An auditing function monitors and keeps a record of user accesses to system resources.In practice, a number of(请作答此空)may cooperatively share the access control function. All Operating systems have at least a rudimentary(基本的).and in many cases a quite robust, access control component. Add-on security packages can add to the ( )access control capabilities of the OS. Particular applications .or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services .

    A.components
    B.users
    C.mechanisms
    D.algorithms

    答案:A
    解析:
    在物理安全和信息安全领域,访问控制是访问一个地方或其他资源的选择性限制。访问的行为可能是消耗、进入或使用。访问资源的权限称为授权。访问控制机制介于用户(或代表用户的过程的执行)和系统资源之间,资源如应用程序、操作系统、防火墙、路由器、文件和数据库。系统必须首先认证用户的访问企图。典型的,认证功能确定一个用户是否被允许访问该系统。然后,访问控制功能确造此用户的特定访问请求是否允许。安全管理员维护授权数据库,其中指定用户可以访问对那个资源具有什么类型的访问权限。访问控制功能查询数据库以确定是否授权访问。审计功能监控和记录用户对系统资源的访问。实际上,很多组件可以一起合作提供访问控制功能。所有操作系统至少具有基本的访问控制组件,而且这些组件大多情况下非常健壮。附加安全包可以添加到操作系统的本地安全控制功能。特定的应用和实用工具,如数据管理系统,也并入了访问控制功能。如防火墙等外部设备也能够提供访问控制服务。

  • 第14题:

    In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization (授权).
    An access control mechanism (71) between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is (72) to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(73)access. An auditing function monitors and keeps a record of user accesses to system resources.
    In practice, a number of(74)may cooperatively share the access control function. All operating systems have at least a rudimentary(基本的), and in many cases a quite robust, access control component. Add-on security packages can add to the(75)access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services.

    A.cooperates
    B.coordinates
    C.connects
    D.mediates

    答案:C
    解析:
    在物理安全和信息安全领域,访问控制是对一个地方或其他资源的访问限制。访问的行为可能意味着消费、输入或使用。允许访问资源被称为授权。
    访问控制机制连接用户(代表用户执行的进程)和系统资源(如应用程序、操作系统、防火墙、路由器、文件和数据库)之间的连接。系统必须首先对用户进行身份验证。通常,身份验证功能决定用户是否被允许访问系统。然后,访问控制功能决定是否允许该用户指定的访问权限。安全管理员维护一个授权数据库,该数据库指定允许该用户访问哪些资源的类型。访问控制函数咨询此数据库以确定是否授予访问权。审计功能监视并保存用户访问系统资源的记录。
    在实践中,一些用户可以合作共享访问控制函数。所有操作系统都至少有一个基本的,而且在许多情况下是一个相当健壮的访问控制组件。附加安全包可以添加到操作系统的自动访问控制功能。特定的应用程序或实用程序,如数据库管理系统,也包括访问控制功能。外部设备,如防火墙,也可以提供访问控制服务。

  • 第15题:

    In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization (授权).
    An access control mechanism (71) between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is (72) to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(73)access. An auditing function monitors and keeps a record of user accesses to system resources.
    In practice, a number of(74)may cooperatively share the access control function. All operating systems have at least a rudimentary(基本的), and in many cases a quite robust, access control component. Add-on security packages can add to the(75)access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services.

    A.components
    B.users
    C.mechanisms
    D.algorithms

    答案:B
    解析:
    在物理安全和信息安全领域,访问控制是对一个地方或其他资源的访问限制。访问的行为可能意味着消费、输入或使用。允许访问资源被称为授权。
    访问控制机制连接用户(代表用户执行的进程)和系统资源(如应用程序、操作系统、防火墙、路由器、文件和数据库)之间的连接。系统必须首先对用户进行身份验证。通常,身份验证功能决定用户是否被允许访问系统。然后,访问控制功能决定是否允许该用户指定的访问权限。安全管理员维护一个授权数据库,该数据库指定允许该用户访问哪些资源的类型。访问控制函数咨询此数据库以确定是否授予访问权。审计功能监视并保存用户访问系统资源的记录。
    在实践中,一些用户可以合作共享访问控制函数。所有操作系统都至少有一个基本的,而且在许多情况下是一个相当健壮的访问控制组件。附加安全包可以添加到操作系统的自动访问控制功能。特定的应用程序或实用程序,如数据库管理系统,也包括访问控制功能。外部设备,如防火墙,也可以提供访问控制服务。

  • 第16题:

    公共关系的英文是()。

    • A、public relations         
    • B、public relation
    • C、publication relations 
    • D、publication relation

    正确答案:A

  • 第17题:

    What security procedure would force/require an employee to work in collusion with another employee of the company in order to have access to unauthorized da-ta or to defeat the company security mechanisms? 什么样的安全程序会迫使雇员与其他的雇员勾结,来访问未经授权的数据,从而绕过公司的安全机制?()

    • A、Security personel monitoring of audit logs. 安全人员监控审计日志
    • B、Periodically reviewing subject's access rights. 定期审查主体的访问
    • C、Limiting the specific accesses of operations personnel. 限制操作人员的特定访问
    • D、Job rotation of people through different assignments. 通过人员的工作轮换

    正确答案:C

  • 第18题:

    What is the function of Host Checker?()

    • A、To allow clientless access to the network
    • B、To restrict access to protected resources on the network
    • C、To scan an endpointfor compliance with security policies
    • D、To push a firewall policy to the endpoint's local firewall application

    正确答案:B

  • 第19题:

    You have an enterprise subordinate certification authority (CA). The CA issues smart card logon  certificates.     Users are required to log on to the domain by using a smart card. Your company’s corporate  security policy states that when an employee resigns, his ability to log on to the network must be  immediately revoked.     An employee resigns. You need to immediately prevent the employee from logging on to the  domain.     What should you do()

    • A、Revoke the employee’s smart card certificate.
    • B、Disable the employee’s Active Directory account.
    • C、Publish a new delta certificate revocation list (CRL).
    • D、Reset the password for the employee’s Active Directory account.

    正确答案:B

  • 第20题:

    You have an Exchange Server 2010 organization for a company named Contoso, Ltd. Contoso has the following security policy:  .Messages that contain the word budget cannot be sent to external recipients .Messages that contain the name Northwind Traders must be sent to the legal department automaticallyYou need to recommend a solution to meet the security policy.  What should you recommend?()

    • A、Create two transport rules.
    • B、Create two message classifications.
    • C、Create one transport rule and configure a legal hold.
    • D、Create one message classification and configure a legal hold.

    正确答案:A

  • 第21题:

    多选题
    Given an EL function declared with:11.  12.spin 13.com.example.Spinner 14. 15.java.lang.String spinIt() 16. 17. Which two are true?()
    A

    The function method must have the signature: public String spin().

    B

    The method must be mapped to the logical name spin in the web.xml file.

    C

    The function method must have the signature: public String spinIt().

    D

    The function method must have the signature public static String spin().

    E

    The function method must have the signature: public static String spinIt().

    F

    The function class must be named Spinner, and must be in the package com.example.


    正确答案: B,F
    解析: 暂无解析

  • 第22题:

    单选题
    How can readers find out more about the new processes?
    A

    By visiting the company’s main marketing web site

    B

    By speaking to the Human Resources manager

    C

    By reading the memo entitled “streamlining measures”

    D

    By looking up the employee notice page online


    正确答案: D
    解析:
    根据第3段第1句For details on the automated process and broader streamlining measures, visit our employee notice page under www.prolert.employees.com可知答案为D。

  • 第23题:

    单选题
    In addition to Human Resources, with what company function must the collection of physical evidence be coordinated if an employee is suspected? 当一个员工受到怀疑时,除了人力资源部门,哪个公司职能应协作收集物理证据?()
    A

    Industrial Security 工业安全

    B

    Legal 法务

    C

    Public Relations 公共关系

    D

    External Audit Group 外部审计团体


    正确答案: D
    解析: 暂无解析