更多“单选题Which of the following would be an example of a biometric device?()A USB security keyB smart card readerC thumb print readerD encryption password”相关问题
  • 第1题:

    Which of the following are types of biometric devices used in server rooms?()

    A. Mantraps

    B. Fingerprint scanners

    C. CCTV systems

    D. Retina scanner

    E. Proxy card readers


    参考答案:B, D

  • 第2题:

    When configuring a POS system, which of the following peripheral devices would MOST likelyneed to be installed?()

    • A、Optical mouse
    • B、Handheld digitizer
    • C、Barcode reader
    • D、Touchscreen
    • E、Document scanner
    • F、Keyboard
    • G、External USB drive

    正确答案:B,C,D

  • 第3题:

    A customer, who brings their laptop to work on a daily basis, calls to ask for the best way to add USB ports and an additional network card to their laptop. Which of the following would meet the user’s requirements?()

    • A、Docking station
    • B、Self powered USB hub
    • C、KVM switch
    • D、Non-powered USB hub

    正确答案:A

  • 第4题:

    When adding a FireWire adapter to a laptop, which of the following ports would MOST likely beused? ()

    • A、MMC port
    • B、SODIMM slot
    • C、Express card 34
    • D、USB 1.1 port

    正确答案:C

  • 第5题:

    Which of the following is a multimedia device?()

    • A、Biometric device
    • B、Mouse
    • C、Camcorder
    • D、Infrared scanner

    正确答案:C

  • 第6题:

    Which of the following has to be installed on a laptop in order to use a compact flash storage device?()

    • A、a multi-media card reader
    • B、USB 2.0 drivers
    • C、USB 1.1 drivers
    • D、an enhanced 1.44 floppy drive

    正确答案:A

  • 第7题:

    You are a help desk technician for your company. Susan is an executive. Because Susan travels frequently, she uses a Windows XP Professional portable computer that has a smart card reader.  Susan asks you to configure her computer so that she can dial in to the company network when she is out of the office. Company security policy states that dial-in users must use a smart card when they connect to the network, and that the users must use the strongest form of data encryption possible. Company security policy also states that client computers must disconnect if the Routing and Remote Access server does not support both smart card authentication and the strongest possible authentication. You need to configure the dial-up connection properties on Susan’s computer to dial in to the company network. Your solution must ensure that company security policies are enforced.  Which three actions should you perform?() 

    • A、Select the Advanced (custom settings) security option.
    • B、Select the Require data encryption check box. 
    • C、Select the Typical (recommended settings) security option. 
    • D、Select the Use smart card item from the Validate my identity as follows list.
    • E、Select the Maximum strength encryption item from the Data encryption list.
    • F、Select the Extensible Authentication Protocol (EAP) option, and select Smart Card or other Certificate from the EAP list.

    正确答案:A,E,F

  • 第8题:

    单选题
    Which of the following would be an example of a biometric device?()
    A

    USB security key

    B

    smart card reader

    C

    thumb print reader

    D

    encryption password


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following ensures the MOST secure access to a server room?()
    A

     ID card readers

    B

     Server rack doors

    C

     Biometric devices

    D

     Locked doors


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    A customer, who brings their laptop to work on a daily basis, calls to ask for the best way to add USB ports and an additional network card to their laptop. Which of the following would meet the user’s requirements?()
    A

    Docking station

    B

    Self powered USB hub

    C

    KVM switch

    D

    Non-powered USB hub


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following storage devices is not an example of an optical storage device?()
    A

    Blu-Ray

    B

    DVD

    C

    SSD

    D

    CD


    正确答案: A
    解析: 暂无解析

  • 第12题:

    多选题
    Which of the following are types of biometric devices used in server rooms? ()
    A

    Mantraps

    B

    Fingerprint scanners

    C

    CCTV systems

    D

    Retina scanner

    E

    Proxy card readers


    正确答案: D,B
    解析: 暂无解析

  • 第13题:

    Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examplesof which of the following security types?()

    • A、Physical
    • B、Logical
    • C、Software
    • D、Authentication

    正确答案:A

  • 第14题:

    A new computer is displaying the wrong amount of memory. Which of the following may be the cause?()

    • A、The module is installed backwards.
    • B、A USB device is using some memory.
    • C、An onboard video card is using some memory.
    • D、The CPU is using some memory.

    正确答案:C

  • 第15题:

    Which of the following is the MOST secure method to authenticate users?()

    • A、User ID, a strong password, and a fingerprint scanner
    • B、User ID, a strong password, and a token based device
    • C、User ID and two levels of strong password requirements
    • D、User ID, a strong password, and a smart card

    正确答案:A

  • 第16题:

    Which of the following would be an example of a biometric device?()

    • A、USB security key
    • B、smart card reader
    • C、thumb print reader
    • D、encryption password

    正确答案:C

  • 第17题:

    A KVM system may connect which of the following?()

    • A、PS/2 mouse
    • B、USB mouse
    • C、SVGA display
    • D、NIC
    • E、USB memory stick
    • F、HBA card

    正确答案:A,B,C

  • 第18题:

    Which of the following are types of biometric devices used in server rooms? ()

    • A、 Mantraps
    • B、 Fingerprint scanners
    • C、 CCTV systems
    • D、 Retina scanner
    • E、 Proxy card readers

    正确答案:B,D

  • 第19题:

    You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()

    • A、Enable automatic certificate enrollment
    • B、Enforce smart card logons
    • C、Enable Encrypting File System (EFS) for offline files
    • D、Enable a screen saver password

    正确答案:B,C

  • 第20题:

    单选题
    Which of the following is the MOST secure method to authenticate users?()
    A

    User ID, a strong password, and a fingerprint scanner

    B

    User ID, a strong password, and a token based device

    C

    User ID and two levels of strong password requirements

    D

    User ID, a strong password, and a smart card


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    A second network card in a server that activates if the primary card fails is an example of which of the following network performance optimization?()
    A

    Load balancing

    B

    QoS

    C

    High availability

    D

    Fault tolerance


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    A new computer is displaying the wrong amount of memory. Which of the following may be the cause?()
    A

    The module is installed backwards.

    B

    A USB device is using some memory.

    C

    An onboard video card is using some memory.

    D

    The CPU is using some memory.


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    Examine the following RMAN command:RMAN> CONFIGURE ENCRYPTION FOR DATABASE ON;RMAN> BACKUP DATABASE PLUS ARCHIVELOG;Which prerequisite must be met before accomplishing the backup?()
    A

    Provide a password for the encryption

    B

    Set up an Oracle wallet for the encryption

    C

    No setup is required as it is a default encryption method

    D

    Both Oracle wallet and password must be set up for the encryption


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examplesof which of the following security types?()
    A

    Physical

    B

    Logical

    C

    Software

    D

    Authentication


    正确答案: C
    解析: 暂无解析