单选题Which benefit does digital subscriber line (DSL) systems for broadband access provide to the user?()A Dedicated lines for high security data transferB Data and audio signals that share the same communications infrastructureC Secure access to company ex

题目
单选题
Which benefit does digital subscriber line (DSL) systems for broadband access provide to the user?()
A

Dedicated lines for high security data transfer

B

Data and audio signals that share the same communications infrastructure

C

Secure access to company extranet

D

Simple solution for high-quality digital video using coaxial cable


相似考题

2.In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization (授权). An access control mechanism (71) between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is (72) to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(73)access. An auditing function monitors and keeps a record of user accesses to system resources. In practice, a number of(74)may cooperatively share the access control function. All operating systems have at least a rudimentary(基本的), and in many cases a quite robust, access control component. Add-on security packages can add to the(75)access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services.A.open B.monitor C.grant D.seek

更多“单选题Which benefit does digital subscriber line (DSL) systems for broadband access provide to the user?()A Dedicated lines for high security data transferB Data and audio signals that share the same communications infrastructureC Secure access to company ex”相关问题
  • 第1题:

    Which benefit does digital subscriber line (DSL) systems for broadband access provide to the user?()

    • A、Dedicated lines for high security data transfer
    • B、Data and audio signals that share the same communications infrastructure
    • C、Secure access to company extranet
    • D、Simple solution for high-quality digital video using coaxial cable

    正确答案:B

  • 第2题:

    A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()

    • A、WEP encryption
    • B、Channel rotation
    • C、Disable SSID
    • D、WPA encryption

    正确答案:D

  • 第3题:

    Which of the following connection types use a phone line as a carrier to provide access to theInternet?()

    • A、Cellular
    • B、Satellite
    • C、ISDN
    • D、WiMAX
    • E、DSL

    正确答案:C,E

  • 第4题:

    What is the goal of the borderless network architecture?()

    • A、to provide users with A single device that permits access to information anywhere
    • B、to provide users with the same productivity and access to information no matter where are or which device they use
    • C、to eliminate the need for border security and firewalls
    • D、to provide companies with A way to extend their security and control over employees on the internet

    正确答案:B

  • 第5题:

    Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()

    • A、The cell phone should require a password after a set period of inactivity.
    • B、The cell phone should only be used for company related emails.
    • C、The cell phone data should be encrypted according to NIST standards.
    • D、The cell phone should have data connection abilities disabled.

    正确答案:A

  • 第6题:

    Which encryption type is used to secure user data in an IPsec tunnel?()

    • A、symmetric key encryption
    • B、asymmetric key encryption
    • C、RSA
    • D、digital certificates

    正确答案:A

  • 第7题:

    You have a computer that runs Windows 7. The computer contains a folder named C:/data. You use Advanced Sharing to share C:/data by using the default share permissions. When a user tries to access theshare over the network, he gets an Access is Denied error message. You need to ensure that the user canaccess the share.  What should you do?()

    • A、Allow file and printer sharing through Windows Firewall.
    • B、Change the network location from a Public network to a Home or Work network.
    • C、From the Security settings of the folder, assign the user the Read NTFS permission.
    • D、From the Advanced Sharing settings of the folder, assign the user the Read share permission.

    正确答案:C

  • 第8题:

    单选题
    Which description best characterizes the Cisco mobility solution?()
    A

    provides high-level integrated security from the wireless access point to the client and automatically encrypts voice and data in transit

    B

    authenticates users and devices so that it is impossible for a rogue device to be connected to the network

    C

    allows you to centralize management, automate repetitive tasks, and provision IP services easily

    D

    centralizes your infrastructure and allows you to share resources more effectively by combining separate data centers into an interconnected SAN


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    The AirMagnet passive site survey tool can provide RF coverage data, except for which parameter?()
    A

    Signal strength (4th access point)

    B

    Signal strength (3rd access point)

    C

    Channel interference

    D

    Predictive physical data rate downlink (2nd access point)


    正确答案: A
    解析: 暂无解析

  • 第10题:

    多选题
    Which three can be symptoms of the growth phase in the Cisco SBR methodology?()
    A

    Facilitate Employee Reachability

    B

    Unable to provide rapid secure access to customer history, data or buying behavior

    C

    Need to provide XYZ LTD with a basic up-to-date website

    D

    Provide rapid access for geographically dispersed employees

    E

    Need to facilitate customer reachability

    F

    Provide a Website on par with competitors


    正确答案: E,B
    解析: 暂无解析

  • 第11题:

    多选题
    Which two demonstrate encapsulation of data? ()
    A

    Member data have no access modifiers.

    B

    Member data can be modified directly.

    C

    The access modifier for methods is protected.

    D

    The access modifier to member data is private.

    E

    Methods provide for access and modification of data.


    正确答案: A,B
    解析: 暂无解析

  • 第12题:

    单选题
    You have a computer that runs Windows 7. The computer contains a folder named C:/data. You use Advanced Sharing to share C:/data by using the default share permissions. When a user tries to access theshare over the network, he gets an Access is Denied error message. You need to ensure that the user canaccess the share.  What should you do?()
    A

    Allow file and printer sharing through Windows Firewall.

    B

    Change the network location from a Public network to a Home or Work network.

    C

    From the Security settings of the folder, assign the user the Read NTFS permission.

    D

    From the Advanced Sharing settings of the folder, assign the user the Read share permission.


    正确答案: C
    解析: 暂无解析

  • 第13题:

    Select a key benefit of DSL.()

    • A、TCP packet sizes can be optimized by the router so there is no IPSec or AAL5 padding.
    • B、The local loop is a dedicated connection for a single subscriber to the DSLAM. 
    • C、Access to the WAN media uses a poll/response mechanism so no two subscribers transmit at the same time. 
    • D、There are no distance requirements from the Central Office (CO). 

    正确答案:B

  • 第14题:

    A financial company is auditing to ensure their systems are safe from external attack.They have just purchased new Power 750 servers. Which features of AIX 6.1 will help in the auditing process?()

    • A、IPSec and Kerberos Authentication
    • B、Secure By Default and AIX Security Expert
    • C、Trusted Execution and Role Based Access Control
    • D、First Failure Data Capture and Storage Protection Keys

    正确答案:B

  • 第15题:

    Which three can be symptoms of the growth phase in the Cisco SBR methodology?()

    • A、Facilitate Employee Reachability
    • B、Unable to provide rapid secure access to customer history, data or buying behavior
    • C、Need to provide XYZ LTD with a basic up-to-date website
    • D、Provide rapid access for geographically dispersed employees
    • E、Need to facilitate customer reachability
    • F、Provide a Website on par with competitors

    正确答案:A,D,F

  • 第16题:

    Which benefit does digital subscriber line (DSL) systems for broadband access provide to the user?()

    • A、Secure access to company extranet
    • B、Dedicated lines for high security data transfer
    • C、Simple solution for high-quality digital video using coaxial cable
    • D、Data and audio signals that share the same communications infrastructure

    正确答案:D

  • 第17题:

    Which two demonstrate encapsulation of data?()  

    • A、 Member data have no access modifiers.
    • B、 Member data can be modified directly.
    • C、 The access modifier for methods is protected.
    • D、 The access modifier to member data is private.
    • E、 Methods provide for access and modification of data.

    正确答案:D,E

  • 第18题:

    ABC Corp. is implementing 11i Oracle Applications. The company has two local administrators in separate locations. They need to ensure that only a relevant set of users is visible to each of these local administrators. Which action will meet the requirement?()

    • A、create a separate role for each local administrator
    • B、specify user administration privileges in Oracle User Management
    • C、use Data Security to provide relevant access to each local administrator
    • D、use Function Security to provide relevant access to each local administrator

    正确答案:B

  • 第19题:

    单选题
    A Windows Communication Foundation (WCF) service interacts with the database of a workflow engine. Data access authorization is managed by the database, which raises security exceptions if a user is unauthorized to access it.You need to ensure that the application transmits the exceptions raised by the database to the client that is calling the service.Which behavior should you configure and apply to the service?()
    A

    routing

    B

    service Debug

    C

    service Security Audit

    D

    workflow Unhandled Exception


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    ABC Corp. is implementing 11i Oracle Applications. The company has two local administrators in separate locations. They need to ensure that only a relevant set of users is visible to each of these local administrators. Which action will meet the requirement?()
    A

    create a separate role for each local administrator

    B

    specify user administration privileges in Oracle User Management

    C

    use Data Security to provide relevant access to each local administrator

    D

    use Function Security to provide relevant access to each local administrator


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    After creating backups of critical system and user data, which of the following is the BEST location to store the backups?()
    A

    In the supply closet so anyone can access them if needed

    B

    Near the server for easy access to restore files

    C

    Locked in a cabinet in the IT Manager’s office

    D

    At a secure off-site storage facility


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()
    A

    The cell phone should require a password after a set period of inactivity.

    B

    The cell phone should only be used for company related emails.

    C

    The cell phone data should be encrypted according to NIST standards.

    D

    The cell phone should have data connection abilities disabled.


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    Which benefit does digital subscriber line (DSL) systems for broadband access provide to the user?()
    A

    Secure access to company extranet

    B

    Dedicated lines for high security data transfer

    C

    Simple solution for high-quality digital video using coaxial cable

    D

    Data and audio signals that share the same communications infrastructure


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
    A

    WEP encryption

    B

    Channel rotation

    C

    Disable SSID

    D

    WPA encryption


    正确答案: D
    解析: 暂无解析