Policies and procedures
Encryption
Locked doors
Security personnel
Backup tapes
第1题:
A. ICMP Echo
B. VoIP (RTP)
C. IPX
D. SNMP
第2题:
Which of the following technologies allows multiple logical subnets to span an entire physical switched network?()
第3题:
Which of the following is BEST for providing network security?()
第4题:
Which of the following security threats involves making phone calls?()
第5题:
A crossover cable is MOST commonly associated with which of the following layers of the OSI model?()
第6题:
Which of the following are examples of physical security measures?()
第7题:
Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()
第8题:
Which of the following options should be used to obtain the latest security patches for AIX?()
第9题:
Which of the following commands indicates the available state of a physical adapter?()
第10题:
ICMP Echo
VoIP (RTP)
IPX
SNMP
第11题:
Completion according to outlines
Completion with multiple choices
Completion according to topic sentences
Completion with detailed examples related to the topic
第12题:
A .Procedural Controls流程控制
B. Electronic Systems电子系统
C .Security Guards安全守卫
D .Hardware Devices硬件设备
第13题:
Guards are appropriate whenever the function required by the security program involves which of the following?守卫合适执行安全程序所涉及以下哪一项功能?()
第14题:
Operation security requires the implementation of physical security to con-trol which of the following? 操作安全要求对下列哪项实施物理安全控制?()
第15题:
Which of the following should be done FIRST to a hard drive before it is disposed?()
第16题:
Which of the following does not affect security on a wireless access point?()
第17题:
A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()
第18题:
Which of the following laptop displays would provide physical flexibility and transparency?()
第19题:
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
第20题:
A System p administrator needs to set the default password length for all users to six characters. Which of the following files needs to be edited to accomplish this ()
第21题:
Accommodation heating system
Steering gear
Boiler control
Cargo control
第22题:
passwords密码
guards守卫
locks锁
badges徽章
第23题:
Policies and procedures
Encryption
Locked doors
Security personnel
Backup tapes
第24题:
The use of discriminating judgment使用辨别判断能力的时候
The use of physical force使用暴力的时候