Who should DECIDE how a company should approach security and what security measures should be implemented?谁应该决定一个公司应该如何对待安全以及实施什么样的安全措施?()
第1题:
What are two important approaches to communicate when identifying a customer’s security risks? (Choose two.) ()
第2题:
Which of the following is given the responsibility of the maintenance and protection of the data?下列哪一角色对数据的维护和保护负有责任()
第3题:
The security team has implemented new guidelines on how to handle sensitive information storedon workstations based on a past incident involving information found on donated workstations.Which of the following should be completed by technicians before donating the workstations?()
第4题:
An administrator was asked to log information on possible security breaches on a server. To which file should additional entries be added to capture this information()
第5题:
You need to recommend a solution for managing the address information of the user accounts. The solution must meet the company’s security requirements. What should you include in the recommendation?()
第6题:
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance.You must make sure that all SQL Server instances are consistently configured for naming conventions, security settings, force index creation and avoidance of data fragmentation. So what action should you perform to achieve this goal?()
第7题:
It should be implemented in a management VLAN.
Its connection to managed devices should be over a data VLAN.
It is made up of Cisco Security MARS and Clean Access software.
It should be deployed as close to the edge of the network as possible.
It delivers policy administration and enforcement for the Cisco Self-Defending Network.
第8题:
You should use the Database Engine Tuning Advisor.
In Microsoft SQL Server Management Studio, you should create a maintenance plan
You should use the SQL Server Configuration Manager
In Microsoft SQL Server Management Studio, you should create a policy
第9题:
The local security specialist本地安全专家
The systems auditor系统审计师
The central security manager中心安全经理
The business manager业务经理
第10题:
Smaller companies are at less risk than larger enterprises, so their security needs are not as great.
Business strategy should directly relate to the security policy and budget.
The designated security expert should report to the IT department, since that is where thesolution will be implemented.
Security should be a continuous process.
Security solutions should come from multiple vendors to make it easier to coordinate security events from the point of origin.
第11题:
Data owner 数据拥有者
Auditor 审计员
The information security specialist 信息安全专家
Senior management 高级管理者
第12题:
IS security specialists IS安全专家
Senior Management高级管理层
Senior security analysts高级安全分析师
systems Auditors系统审计师
第13题:
Which two statements about Cisco Security Management Suite are correct?()
第14题:
Which must bear the primary responsibility for determining the level of protection needed for information systems resources?哪一个角色必须承担决定信息系统资源保护级别的主要责任?()
第15题:
Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()
第16题:
A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()
第17题:
You need to recommend a management solution for Server1 that meets the company's security requirements. What should you include in the recommendation?()
第18题:
You need to recommend a security strategy for WebApp2 that meets the company’s applicaton requirements.What should you include in the recommendation?()
第19题:
A system where all users are cleared to view the most highly classified data on the system.系统上的所有用户被许可查看最高级别的数据
A system that contains only data of one security classification.只包含一个安全级别的数据
A system with data that contains only data of the highest security classification.只包含最高安全级别的数据
A system that uses a Multi-Level Security Policy to separate the highly classified data from the other data residing on the system.使用多级安全策略去划分高级别数据和其他数据。
第20题:
access-based enumeration (ABE)
Authentication Mechanism Assurance
Authorization Manager
Hyper-V Manager
第21题:
precaution measures
safety measures
security measures
emergency response measures
第22题:
a ship security plan
a ship security officer
a company security officer
certain onboard equipments
第23题:
the security of information on the network used to be a worry.
all the data should be stored on the same system.
the company’s computer-based information is well-protected.