passwords密码
guards守卫
locks锁
badges徽章
第1题:
A、government
B、customers
C、creditors
D、all of the above
第2题:
Stephen Hawking are true examples of people who rose to international fame in spite of physical handicap.()
第3题:
Computer systems consist of two very different types of elements: Hardware, which includes all the physical things that can be touched and(71)which tells the hardware how to do.
A.Operating system
B.I/O devices
C.Courseware
D.Software
第4题:
A. Policies and procedures
B. Encryption
C. Locked doors
D. Security personnel
E. Backup tapes
第5题:
A program
B keyboard
C mouse
D Display
第6题:
What are two roles of the authenticator as described in the 802.1X standard? ()
第7题:
What is the function of the no switchport catalyst switch interface configuration command?()
第8题:
Which of the following is most accurate in describing the required types of FCP zoningconsiderations when implementing a SAN Volume Controller (SVC)?()
第9题:
You are creating a Windows Forms application by using the .NET Framework 3.5. You create a new form in your application.You add 100 controls at run time in the Load event handler of the form. Users report that the form takes a long time to get displayed. You need to improve the performance of the form. What should you do?()
第10题:
passwords密码
guards守卫
locks锁
badges徽章
第11题:
Policies and procedures
Encryption
Locked doors
Security personnel
Backup tapes
第12题:
It proxies the authentication information between the supplicant and the authentication server.
It controls physical access to the network.
It communicates with the authentication server only.
It is responsible for verifying the identity of the supplicant through the use of an internal database.
第13题:
听力原文:Other aspects of operational risk include major failure of information technology systems or events such as major fires or other disasters.
(6)
A.Information technology system can cause operational risk.
B.A major fire can be a cause of operational risk.
C.The most important types of operational risk involve breakdowns in internal controls and corporate governance.
D.Other aspects of operational risk include firing its dealers, lending officers or other staff exceeding their authority or conducting business in an unethical or risky manner.
第14题:
Describe the different types of ETL metadata and provide examples of each.
举例说明各种ETL过程中的元数据。
第15题:
A. It proxies the authentication information between the supplicant and the authentication server.
B. It controls physical access to the network.
C. It communicates with the authentication server only.
D. It is responsible for verifying the identity of the supplicant through the use of an internal database.
第16题:
The ______ controls the cursor or pointer on the screen and allows the user to access commands by pointing and clicking.
A.graphics
B.printer
C.program
D.mouse
第17题:
TACACS+ authentication uses whichthree packet types? ()
第18题:
On the serial interface of a router, an inbound access list is configured to deny all traffic from UDP and TCP ports 21, 23, and 25. All other traffic is permitted. Based on this information, which types of traffic will be allowed through this interface?()
第19题:
Which of the following are examples of physical security measures?()
第20题:
You are a help desk technician for your company. All users have Windows XP Professional computers. A user named Richard reports that he cannot access www.southridgevideo.com, an Internet Web site, by using Internet Explorer. Whenever Richard types http://www.southridgevideo.com into the Internet Explorer address bar, he receives the following error message: “Your security settings prohibit the display of unsigned ActiveX Controls.” According to company policy, users should download unsigned ActiveX controls only from Internet Web sites that have been approved by the company’s information security department. You verify that www.southridgevideo.com is listed as an approved Web site. On Richard’s computer, you also verify that Internet Explorer is configured with the default settings. You need to ensure that Richard can access www.southridgevideo.com without receiving an error message. You also want to comply with company policy. You need to configure Richard’s computer. First, you open the Security properties for Internet Explorer on Richard’s computer. Which two actions should you perform next?()
第21题:
Add www.southridgevideo.com to the Trusted Sites list.
Remove www.southridgevideo.com from the Restricted Sites list.
In the Internet zone settings, enable the Allow unsigned ActiveX controls option.
Open the Local intranet Sites dialog box and clear the Include all network paths check box.
Open the Trusted Sites dialog box and clear the Require server verification for all sites in this zone check box.
Open the Intranet Sites dialog box. In Advanced properties, add www.southridgevideo.com to the list of Web sites.
第22题:
SMTP
DNS
FTP
Telnet
HTTP
POP3
第23题:
Junos Pulse should be configured with location awareness rules configured.
Odyssey Access Client should be installed with Host Checker configured to check the client's location.
Junos Pulse should be configured with all components installed.
Agentless access should be enabled so that clients can connect to any service without concern for installing an agent.
第24题:
Software
Courseware
Operatingsystem
I/Odevices