单选题Which of the following is the MOST secure method to authenticate users?()A User ID, a strong password, and a fingerprint scannerB User ID, a strong password, and a token based deviceC User ID and two levels of strong password requirementsD User ID, a s

题目
单选题
Which of the following is the MOST secure method to authenticate users?()
A

User ID, a strong password, and a fingerprint scanner

B

User ID, a strong password, and a token based device

C

User ID and two levels of strong password requirements

D

User ID, a strong password, and a smart card


相似考题
更多“Which of the following is the MOST secure method to authenti”相关问题
  • 第1题:

    For the following options, which feature is the foundation of Cisco Self-Defending Network technology?()

    • A、secure network platform
    • B、secure connectivity
    • C、threat control and containment
    • D、policy management

    正确答案:A

  • 第2题:

    Which of the following standards or encryption types is the MOST secure for wireless networking?()

    • A、WEP
    • B、AES
    • C、TKIP
    • D、DES

    正确答案:B

  • 第3题:

    A bare metal backup requires which of the following backup method ologies?()

    • A、 Full
    • B、 Differential
    • C、 Incremental
    • D、 Database

    正确答案:A

  • 第4题:

    Which of the following is the recommended disposal method for used computers?()

    • A、Trash can
    • B、Burial
    • C、Recycling center
    • D、Storage shed

    正确答案:C

  • 第5题:

    Which of the following technologies is the MOST secure form of wireless encryption?()

    • A、SSL
    • B、WPA
    • C、WEP
    • D、TLS

    正确答案:B

  • 第6题:

    Which of the following displays uses gas as a method for projecting an image?()

    • A、CRT
    • B、Plasma
    • C、LED
    • D、LCD

    正确答案:B

  • 第7题:

    Which of the following is a secure method of remote access via command line?()

    • A、RCP
    • B、Telnet
    • C、RSH
    • D、SSH

    正确答案:D

  • 第8题:

    Which of the following should be changed to secure access to a WAPs configuration management interface?()

    • A、SSID
    • B、WPA2
    • C、DHCP
    • D、Password

    正确答案:D

  • 第9题:

    Which of the following is the MOST common secure web server port?()

    • A、22
    • B、80
    • C、110
    • D、443

    正确答案:D

  • 第10题:

    单选题
    Which of the following ensures the MOST secure access to a server room?()
    A

     ID card readers

    B

     Server rack doors

    C

     Biometric devices

    D

     Locked doors


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following backup method ologies is MOST time efficient for restoring data?()
    A

     Incremental

    B

     Differential

    C

     Full

    D

     GFS


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()
    A

    VLAN

    B

    Peer to Peer

    C

    VTP

    D

    VPN


    正确答案: B
    解析: 暂无解析

  • 第13题:

    Which of the following backup method ologies is MOST time efficient for restoring data?()

    • A、 Incremental
    • B、 Differential
    • C、 Full
    • D、 GFS

    正确答案:C

  • 第14题:

    An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()

    • A、Secure VPN
    • B、MAC filtering
    • C、IP filtering
    • D、Static IP addresses

    正确答案:B

  • 第15题:

    Which of the following methods of user authentication is the MOST secure?()

    • A、CHAP
    • B、Kerberos
    • C、TACACS
    • D、EAP

    正确答案:B

  • 第16题:

    Which of the following is the MOST secure method to authenticate users?()

    • A、User ID, a strong password, and a fingerprint scanner
    • B、User ID, a strong password, and a token based device
    • C、User ID and two levels of strong password requirements
    • D、User ID, a strong password, and a smart card

    正确答案:A

  • 第17题:

    Which of the following is the MOST secure and efficient way to dispose of rewritable DVD media containing sensitive information?()

    • A、Media should be erased
    • B、Media should be shredded
    • C、Media should be exposed to UV
    • D、Media should be formatted

    正确答案:B

  • 第18题:

    An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()

    • A、SSH
    • B、WEP
    • C、VPN
    • D、WPA

    正确答案:D

  • 第19题:

    Which of the following wireless security techniques is the MOST secure?()

    • A、Enable Wired Equivalent Privacy
    • B、Disable SSID broadcast
    • C、Enable Wi-Fi Protected Access
    • D、Enable MAC filtering

    正确答案:C

  • 第20题:

    You need to recommend a BitLocker recovery method that meets the company’s technical requirements.   Which recovery method should you recommend?()

    • A、a data recovery agent
    • B、a recovery key
    • C、a recovery password printed and stored in a secure location
    • D、a recovery password stored in Active Directory

    正确答案:A

  • 第21题:

    单选题
    Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()
    A

    WEP

    B

    PEAP

    C

    WPA

    D

    TKIP


    正确答案: A
    解析: 暂无解析

  • 第22题:

    多选题
    Which of the following statements about variables and scope are true?()
    A

    Local variables defined inside a method are destroyed when the method is exited.

    B

    Local variables are also called automatic variables.

    C

    Variables defined outside a method are created when the object is constructed.

    D

    A method parameter variable continues to exist for as long as the object is needed in which the method is defined.


    正确答案: C,A
    解析: 本题是讨论变量的类型及作用域。

  • 第23题:

    单选题
    Which of the following describes a secure connection over the Internet between two sites?()
    A

    FTP

    B

    VLAN

    C

    VPN

    D

    HTTP


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    Which of the following is the MOST common secure web server port?()
    A

    22

    B

    80

    C

    110

    D

    443


    正确答案: C
    解析: 暂无解析