User ID, a strong password, and a fingerprint scanner
User ID, a strong password, and a token based device
User ID and two levels of strong password requirements
User ID, a strong password, and a smart card
第1题:
For the following options, which feature is the foundation of Cisco Self-Defending Network technology?()
第2题:
Which of the following standards or encryption types is the MOST secure for wireless networking?()
第3题:
A bare metal backup requires which of the following backup method ologies?()
第4题:
Which of the following is the recommended disposal method for used computers?()
第5题:
Which of the following technologies is the MOST secure form of wireless encryption?()
第6题:
Which of the following displays uses gas as a method for projecting an image?()
第7题:
Which of the following is a secure method of remote access via command line?()
第8题:
Which of the following should be changed to secure access to a WAPs configuration management interface?()
第9题:
Which of the following is the MOST common secure web server port?()
第10题:
ID card readers
Server rack doors
Biometric devices
Locked doors
第11题:
Incremental
Differential
Full
GFS
第12题:
VLAN
Peer to Peer
VTP
VPN
第13题:
Which of the following backup method ologies is MOST time efficient for restoring data?()
第14题:
An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()
第15题:
Which of the following methods of user authentication is the MOST secure?()
第16题:
Which of the following is the MOST secure method to authenticate users?()
第17题:
Which of the following is the MOST secure and efficient way to dispose of rewritable DVD media containing sensitive information?()
第18题:
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()
第19题:
Which of the following wireless security techniques is the MOST secure?()
第20题:
You need to recommend a BitLocker recovery method that meets the company’s technical requirements. Which recovery method should you recommend?()
第21题:
WEP
PEAP
WPA
TKIP
第22题:
Local variables defined inside a method are destroyed when the method is exited.
Local variables are also called automatic variables.
Variables defined outside a method are created when the object is constructed.
A method parameter variable continues to exist for as long as the object is needed in which the method is defined.
第23题:
FTP
VLAN
VPN
HTTP
第24题:
22
80
110
443