单选题Operation security requires the implementation of physical security to con-trol which of the following? 操作安全要求对下列哪项实施物理安全控制?()A evacuation procedures 撤离步骤B incoming hardware 硬件搬入C contingency conditions 应急条件D unauthorized personnel access 未经授权的人员访问

题目
单选题
Operation security requires the implementation of physical security to con-trol which of the following? 操作安全要求对下列哪项实施物理安全控制?()
A

evacuation procedures 撤离步骤

B

incoming hardware 硬件搬入

C

contingency conditions 应急条件

D

unauthorized personnel access 未经授权的人员访问


相似考题
更多“Operation security requires the implementation of physical s”相关问题
  • 第1题:

    You are developing a Windows Communication Foundation (WCF) service. The service operation takes a customer number as the only argument and returns information about the customer. The service requires a security token in the header of the message. You need to create a message contract for the service.Which code segment should you use?()

    A.

    B.

    C.

    D.


    参考答案:D

  • 第2题:

    Which of the following are examples of physical security measures?()

    A. Policies and procedures

    B. Encryption

    C. Locked doors

    D. Security personnel

    E. Backup tapes


    参考答案:C, D

  • 第3题:

    Which service component within the prepare phase recommends the appropriate technology strategy to address a business requirement of the customer?()

    • A、 identifying what a customer requires from a proposed solution
    • B、 analyzes the customer s business requirements and recommends the appropriate Cisco technologies to meet business requirements
    • C、 determining what end-user training a customer requires
    • D、 addressinga customer s physical requirements

    正确答案:B

  • 第4题:

    For the following statements, which one is perceived as a drawback of implementing Fibre ChannelAuthentication Protocol (FCAP)?()

    • A、It is restricted in size to only three segments
    • B、It requires the use of netBT as the network protocol
    • C、It requires the implementation of IKE
    • D、It relies on an underlying Public Key Infrastructure

    正确答案:D

  • 第5题:

    Which is NOT part of a typical wireless site survey?()

    • A、Implementation suggestions
    • B、Access point locations
    • C、Security requirements
    • D、Access point mounting methods

    正确答案:C

  • 第6题:

    For the following attempts, which one is to ensure that no one employee becomes a pervasive securitythreat, that data can be recovered from backups, and that information system changes do not compromisea system’s security?()

    • A、Strategic security planning
    • B、Disaster recovery
    • C、Implementation security
    • D、Operations security

    正确答案:D

  • 第7题:

    Which of the following are examples of physical security measures?()

    • A、Policies and procedures
    • B、Encryption
    • C、Locked doors
    • D、Security personnel
    • E、Backup tapes

    正确答案:C,D

  • 第8题:

    单选题
    ()means the person on board the ship, accountable to the master, designated by the Company as responsible for the security of the ship, including implementation and maintenance of the ship security plan and for liaison with the company security officer and port facility security officers.
    A

    Ship security officer

    B

    Company security officer

    C

    Port facility security officer

    D

    PSC officer


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    ()means the person designated as responsible for the development, implementation, revision and maintenance of the port facility security plan and for liaison with the ship security officers and company security officers.
    A

    Ship security officer

    B

    Company security officer

    C

    Port facility security officer

    D

    PSC officer


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    You are the desktop administrator for one of your company's branch offices. The network in your branch office contains 100 Windows XP Professional computers. The computers are configured with the Compatws.inf security template. One of the network administrators in the company's main office creates a new security template named CompanySec.inf. The new template is designed to be applied to each of the company's Windows XP Professional computers. The users in your branch office have different security requirements from the users in the main office. You need to find out whether the new security template will violate the security requirements of the users in the branch office. What should you do?()
    A

    Run the Secedit.exe command in validation mode and specify the new security template.

    B

    Run the Secedit.exe command in configuration mode and specify the new security template. 

    C

    Use the Security Configuration and Analysis console to import both templates into a security database, and then perform an Analyze operation. 

    D

    Use the Security Configuration and Analysis console to import both templates into a security database, and then perform a Configure operation. 


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    Which statement describes the behavior of a security policy?()
    A

    The implicit default security policy permits all traffic.

    B

    Traffic destined to the device itself always requires a security policy.

    C

    Traffic destined to the device’s incoming interface does not require a security policy.

    D

    The factory-default configuration permits all traffic from all interfaces.


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    You are creating a Windows Communication Foundation (WCF) service based on WSHttpBinding. New audit requirements dictate that callers must be authenticated on every call to ensure that their credentials have not been revoked.You need to ensure that the service will not cache the security request token. What should you do?()
    A

    Apply a ServiceBehavior attribute to the service implementation class with the lnstanceContextMode property set to Single.

    B

    In the message security configuration, change clientCredentialType from lssuedToken to UserName

    C

    In the message security configuration, set establishSecurityContext to false.

    D

    At the end of every operation, call the SessionStateUtility.RaiseSessionEnd method.


    正确答案: C
    解析: 暂无解析

  • 第13题:

    The operation of _______two alternators requires the voltages to be equal and also in phase

    A.paralleling

    B.series-mounting

    C.running

    D.controlling


    正确答案:A

  • 第14题:

    ()is not included in the main contents of the operation and maintenance of the information system.

    A.Daily operation and maintenance

    B.System change

    C.Security management

    D.Business change


    正确答案:D

  • 第15题:

    Which definition best describes the implementation service component within the implement phase? Select exactly 1 answer(s) from the following:()。

    • A、providing a step-by-step plan that details the installation and service-commission tasks required in order to create a controlled-implementation environment that emulates a customer network
    • B、assessing the ability of site facilities to accommodate proposed infrastructure changes
    • C、developing and executing proof-of-concept tests, validating high-level infrastructure design, and identifying any design enhancements
    • D、installing, configuring, and integrating systems components based on an implementation plan developed in earlier phases
    • E、improving a customer’s infrastructure security system

    正确答案:D

  • 第16题:

    Which statement describes the behavior of a security policy?()

    • A、The implicit default security policy permits all traffic.
    • B、Traffic destined to the device itself always requires a security policy.
    • C、Traffic destined to the device’s incoming interface does not require a security policy.
    • D、The factory-default configuration permits all traffic from all interfaces.

    正确答案:C

  • 第17题:

    Which should be the key driver for a company security policy’s creation, implementation and enforcement?()

    • A、 the business knowledge of the IT staff
    • B、 the technical knowledge of the IT staff
    • C、 the company’s business objectives
    • D、 the company’s network topology
    • E、 the IT future directions

    正确答案:C

  • 第18题:

    Operation security requires the implementation of physical security to con-trol which of the following? 操作安全要求对下列哪项实施物理安全控制?()

    • A、evacuation procedures 撤离步骤
    • B、incoming hardware 硬件搬入
    • C、contingency conditions 应急条件
    • D、unauthorized personnel access 未经授权的人员访问

    正确答案:D

  • 第19题:

    You are creating a Windows Communication Foundation (WCF) service based on WSHttpBinding. New audit requirements dictate that callers must be authenticated on every call to ensure that their credentials have not been revoked.You need to ensure that the service will not cache the security request token. What should you do?()

    • A、Apply a ServiceBehavior attribute to the service implementation class with the lnstanceContextMode property set to Single.
    • B、In the message security configuration, change clientCredentialType from lssuedToken to UserName
    • C、In the message security configuration, set establishSecurityContext to false.
    • D、At the end of every operation, call the SessionStateUtility.RaiseSessionEnd method.

    正确答案:C

  • 第20题:

    单选题
    Proper operation of the main engine reduction gear set requires the operation to monitor ()
    A

    the sump oil level

    B

    oil flow sight glasses

    C

    bearing temperatures

    D

    all of the above


    正确答案: B
    解析: 暂无解析

  • 第21题:

    多选题
    Which operation requires that you create an auxiliary instance manually before executing the operation?()
    A

    Backup-based database duplication.

    B

    Active database duplication.

    C

    Tablespace point-in-time recovery.

    D

    No operation requires the creation of an auxiliary instance.


    正确答案: B,A
    解析: 暂无解析

  • 第22题:

    单选题
    Which should be the key driver for a company security policy’s creation, implementation and enforcement?()
    A

     the business knowledge of the IT staff

    B

     the technical knowledge of the IT staff

    C

     the company’s business objectives

    D

     the company’s network topology

    E

     the IT future directions


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    The operation of paralleling two alternators requires the voltages to be ()and also in phase.
    A

    zero

    B

    eliminated

    C

    different

    D

    equal


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    For the following statements, which one is perceived as a drawback of implementing Fibre ChannelAuthentication Protocol (FCAP)?()
    A

    It is restricted in size to only three segments

    B

    It requires the use of netBT as the network protocol

    C

    It requires the implementation of IKE

    D

    It relies on an underlying Public Key Infrastructure


    正确答案: B
    解析: 暂无解析