单选题Which of the following will help protect an operating system from vulnerability?()A Download free anti-virus programs from the Internet.B Perform updates from the manufacturers website regularly.C Using the operating systems email program only to open 

题目
单选题
Which of the following will help protect an operating system from vulnerability?()
A

Download free anti-virus programs from the Internet.

B

Perform updates from the manufacturers website regularly.

C

Using the operating systems email program only to open attachments.

D

Monitoring what is displayed on the screen.


相似考题
更多“单选题Which of the following will help protect an operating system from vulnerability?()A Download free anti-virus programs from the Internet.B Perform updates from the manufacturers website regularly.C Using the operating systems email program only to open ”相关问题
  • 第1题:

    Which of the following are methods to automatically update the antivirus application?() (Select TWO).

    • A、Establish rules in the email scheduling program to perform updates.
    • B、Select Update Now from the program options.
    • C、Use the Automatic Update feature built into the application.
    • D、Use scripts.
    • E、Use Windows Update.

    正确答案:C,D

  • 第2题:

    SQ L*Loader is a utility that can perform which two tasks?()

    • A、Load data from a disk, tape, or named pipes.
    • B、Load data into an Oracle database using DML statements.
    • C、Extract, reorganize, and insert data within an Oracle database.
    • D、Load data from external files into tables in an Oracle database.
    • E、Load data into an Oracle database using operating system commands.
    • F、Load data directly from a non-Oracle database to an Oracle database.

    正确答案:A,D

  • 第3题:

    Which of the following will help protect an operating system from vulnerability?()

    • A、Download free anti-virus programs from the Internet.
    • B、Perform updates from the manufacturers website regularly.
    • C、Using the operating systems email program only to open attachments.
    • D、Monitoring what is displayed on the screen.

    正确答案:B

  • 第4题:

    Which of the following best describes the lock protection provided by DB2 for the current row of a cursor?()

    • A、The cursor is only protected from updates and deletes by concurrent applications.
    • B、The row is only protected from positioned updates and deletes that reference another cursor of the same application.
    • C、The cursor is protected from positioned updates and deletes that reference another cursor of a different application.
    • D、The row is protected from updates and deletes by the current application and from positioned updates and deletes that reference another cursor of the same application.

    正确答案:A

  • 第5题:

    An administrator is looking for the "Open Restricted Shell Terminal" option on the HMC GUI. Under which panel is this option available?() 

    • A、HMC Management, but only from a local connection
    • B、Service Management, but only from a local connection.
    • C、Systems Management, but only from a local connection.
    • D、Systems Management, but only from a remote connection.

    正确答案:A

  • 第6题:

    Which of the following BEST describes the initial process of setting up a new operating system from a CD-ROM? ()

    • A、Format a partition, install device drivers, and install the operating system.
    • B、Create a partition, format the partition, and install the operating system.
    • C、Install the operating system, create a partition, and install device drivers.
    • D、Install the operating system, install device drivers, and create a partition.

    正确答案:B

  • 第7题:

    单选题
    Which of the following will help protect an operating system from vulnerability?()
    A

    Download free anti-virus programs from the Internet.

    B

    Perform updates from the manufacturers website regularly.

    C

    Using the operating systems email program only to open attachments.

    D

    Monitoring what is displayed on the screen.


    正确答案: D
    解析: 暂无解析

  • 第8题:

    单选题
    The company has two thousand servers located around the globe. Which of the following is the BEST method of patch management and deployment?()
    A

    Set all servers to automatically download patches from the manufacturer’s website.

    B

    Install an internal patch management system and deploy from the system.

    C

    Install the patches on each server from a deployment disk.

    D

    RDP into each server, manually download and install the patches.


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following BEST describes the initial process of setting up a new operating system from a CD-ROM? ()
    A

    Format a partition, install device drivers, and install the operating system.

    B

    Create a partition, format the partition, and install the operating system.

    C

    Install the operating system, create a partition, and install device drivers.

    D

    Install the operating system, install device drivers, and create a partition.


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    You work as a database administrator for Supportcenter.cn. You are using Recovery Manager (RMAN) for backup and recovery of your database. You executed the delete command in RMAN to delete a backup of a tablespace. Which statement is true in this scenario?()
    A

    The backup status will be marked expired in RMAN recovery catalog.

    B

    The backup status will be marked deleted in RMAN recovery catalog after you execute the crosscheck command.

    C

    The backup will be deleted physically from the OS (Operating system)and the backup information is removed from the recovery catalogl

    D

    The backup status will be marked deleted and you must delete the backup file manually from the OS (Operating system).

    E

    The backup status will be marked deleted and you must delete the backup file manually from the OS (Operating system), if you are not using Oracle Managed Files (OMF).


    正确答案: E
    解析: 暂无解析

  • 第11题:

    多选题
    Which of the following are methods to automatically update the antivirus application?() (Select TWO).
    A

    Establish rules in the email scheduling program to perform updates.

    B

    Select Update Now from the program options.

    C

    Use the Automatic Update feature built into the application.

    D

    Use scripts.

    E

    Use Windows Update.


    正确答案: C,B
    解析: 暂无解析

  • 第12题:

    单选题
    A customer is running a number of non-IBM servers purchased two years ago and has settled on one of the new IBM xSeries servers as a migration path.  From the following options, which is the preferred migration path?()
    A

    Copy the image of the non-IBM servers and copy that image to the IBM servers, then reboot the IBM servers.

    B

    Copy the image from the non-IBM servers with RDM and install them with IBM Director to the new IBM servers. Reboot the IBM servers.

    C

    Install a fresh operating system using ServerGuide, and then install the applications and copy the data from the old servers.

    D

    Install a fresh operating system on the IBM servers and then run ServerGuide on the IBM servers to migrate the applications and data to the IBM servers.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Which of the following is a way to protect server operating systems from a short term contractor?()

    • A、Biometric devices
    • B、Limited logon hours
    • C、Mantraps
    • D、Rack doors

    正确答案:B

  • 第14题:

    The company has two thousand servers located around the globe. Which of the following is the BEST method of patch management and deployment?()

    • A、Set all servers to automatically download patches from the manufacturer’s website.
    • B、Install an internal patch management system and deploy from the system.
    • C、Install the patches on each server from a deployment disk.
    • D、RDP into each server, manually download and install the patches.

    正确答案:B

  • 第15题:

    An administrator receives reports from users in an office that their 802.11g wireless connectivity has been problematic since the installation of the new wireless phone system. At which of the following frequencies are both systems operating at to cause this issue?()

    • A、2.4GHz
    • B、900MHz
    • C、1.1GHz
    • D、5GHz

    正确答案:A

  • 第16题:

    After installing the base operating system and the Server bundle, a system administrator decides to remove several printer definitions that the system users will not need. Which of the following procedures is the best way for a system administrator to remove the extra printer definitions?()

    • A、Select the SMIT option to remove software products
    • B、Reinstall the desired filesets using the "Force Overwrite" option
    • C、Delete the unnecessary entries from the /usr/lpp/printers directory
    • D、Use the ODM edit (odem) utility to revmoe the definition from the system's ODM database

    正确答案:A

  • 第17题:

    You work as a database administrator for Supportcenter.cn. You are using Recovery Manager (RMAN) for backup and recovery of your database. You executed the delete command in RMAN to delete a backup of a tablespace. Which statement is true in this scenario?()

    • A、The backup status will be marked expired in RMAN recovery catalog.
    • B、The backup status will be marked deleted in RMAN recovery catalog after you execute the crosscheck command.
    • C、The backup will be deleted physically from the OS (Operating system)and the backup information is removed from the recovery catalogl
    • D、The backup status will be marked deleted and you must delete the backup file manually from the OS (Operating system).
    • E、The backup status will be marked deleted and you must delete the backup file manually from the OS (Operating system), if you are not using Oracle Managed Files (OMF).

    正确答案:C

  • 第18题:

    单选题
    Which of the following is a way to protect server operating systems from a short term contractor?()
    A

    Biometric devices

    B

    Limited logon hours

    C

    Mantraps

    D

    Rack doors


    正确答案: C
    解析: 暂无解析

  • 第19题:

    单选题
    Which of the following is a way to protect server operating systems from a short term contractor?()
    A

     Biometric devices

    B

     Limited logon hours

    C

     Mantraps

    D

     Rack doors


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    After installing the base operating system and the Server bundle, a system administrator decides to remove several printer definitions that the system users will not need. Which of the following procedures is the best way for a system administrator to remove the extra printer definitions?()
    A

    Select the SMIT option to remove software products

    B

    Reinstall the desired filesets using the Force Overwrite option

    C

    Delete the unnecessary entries from the /usr/lpp/printers directory

    D

    Use the ODM edit (odem) utility to revmoe the definition from the system's ODM database


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()
    A

    It enables an attacker to perform an IP sweep of devices.

    B

    It enables a hacker to know which operating system the system is running.

    C

    It can overflow the session table to its limit, which can result in rejection of legitimate traffic.

    D

    It creates a ping of death and can cause the entire network to be infected with a virus.


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following is a valid source for Windows operating system updates?()
    A

    SNA

    B

    RIS

    C

    RAS

    D

    WSUS


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    An administrator receives reports from users in an office that their 802.11g wireless connectivity has been problematic since the installation of the new wireless phone system. At which of the following frequencies are both systems operating at to cause this issue?()
    A

    2.4GHz

    B

    900MHz

    C

    1.1GHz

    D

    5GHz


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    Which of the following best describes the lock protection provided by DB2 for the current row of a cursor?()
    A

    The cursor is only protected from updates and deletes by concurrent applications.

    B

    The row is only protected from positioned updates and deletes that reference another cursor of the same application.

    C

    The cursor is protected from positioned updates and deletes that reference another cursor of a different application.

    D

    The row is protected from updates and deletes by the current application and from positioned updates and deletes that reference another cursor of the same application.


    正确答案: B
    解析: 暂无解析