evacuation procedures 撤离步骤
incoming hardware 硬件搬入
contingency conditions 应急条件
unauthorized personnel access 未经授权的人员访问
第1题:
You are developing a Windows Communication Foundation (WCF) service. The service operation takes a customer number as the only argument and returns information about the customer. The service requires a security token in the header of the message. You need to create a message contract for the service.Which code segment should you use?()
A.
B.
C.
D.
第2题:
A. Policies and procedures
B. Encryption
C. Locked doors
D. Security personnel
E. Backup tapes
第3题:
Which service component within the prepare phase recommends the appropriate technology strategy to address a business requirement of the customer?()
第4题:
For the following statements, which one is perceived as a drawback of implementing Fibre ChannelAuthentication Protocol (FCAP)?()
第5题:
Which is NOT part of a typical wireless site survey?()
第6题:
For the following attempts, which one is to ensure that no one employee becomes a pervasive securitythreat, that data can be recovered from backups, and that information system changes do not compromisea system’s security?()
第7题:
Which of the following are examples of physical security measures?()
第8题:
Ship security officer
Company security officer
Port facility security officer
PSC officer
第9题:
Ship security officer
Company security officer
Port facility security officer
PSC officer
第10题:
Run the Secedit.exe command in validation mode and specify the new security template.
Run the Secedit.exe command in configuration mode and specify the new security template.
Use the Security Configuration and Analysis console to import both templates into a security database, and then perform an Analyze operation.
Use the Security Configuration and Analysis console to import both templates into a security database, and then perform a Configure operation.
第11题:
The implicit default security policy permits all traffic.
Traffic destined to the device itself always requires a security policy.
Traffic destined to the device’s incoming interface does not require a security policy.
The factory-default configuration permits all traffic from all interfaces.
第12题:
Apply a ServiceBehavior attribute to the service implementation class with the lnstanceContextMode property set to Single.
In the message security configuration, change clientCredentialType from lssuedToken to UserName
In the message security configuration, set establishSecurityContext to false.
At the end of every operation, call the SessionStateUtility.RaiseSessionEnd method.
第13题:
The operation of _______two alternators requires the voltages to be equal and also in phase
A.paralleling
B.series-mounting
C.running
D.controlling
第14题:
()is not included in the main contents of the operation and maintenance of the information system.
A.Daily operation and maintenance
B.System change
C.Security management
D.Business change
第15题:
Which definition best describes the implementation service component within the implement phase? Select exactly 1 answer(s) from the following:()。
第16题:
Which statement describes the behavior of a security policy?()
第17题:
Which should be the key driver for a company security policy’s creation, implementation and enforcement?()
第18题:
Operation security requires the implementation of physical security to con-trol which of the following? 操作安全要求对下列哪项实施物理安全控制?()
第19题:
You are creating a Windows Communication Foundation (WCF) service based on WSHttpBinding. New audit requirements dictate that callers must be authenticated on every call to ensure that their credentials have not been revoked.You need to ensure that the service will not cache the security request token. What should you do?()
第20题:
the sump oil level
oil flow sight glasses
bearing temperatures
all of the above
第21题:
Backup-based database duplication.
Active database duplication.
Tablespace point-in-time recovery.
No operation requires the creation of an auxiliary instance.
第22题:
the business knowledge of the IT staff
the technical knowledge of the IT staff
the company’s business objectives
the company’s network topology
the IT future directions
第23题:
zero
eliminated
different
equal
第24题:
It is restricted in size to only three segments
It requires the use of netBT as the network protocol
It requires the implementation of IKE
It relies on an underlying Public Key Infrastructure