RJ-31x
RJ-11
RS-232
DB-9
第1题:
When installing a security system, which of the following connectors would be used to connect the security system to the telephone service demarcation?()
第2题:
Which of the following connectors would be used if the EIA/TIA 568 scheme is followed?()
第3题:
A technician is troubleshooting a user’s problem; important Windows services are not starting. In which of the following locations should the technician check to investigate when these services started or stopped?()
第4题:
Which of the following connectors is MOST commonly used for UTP cable?()
第5题:
Which of the following would be used to monitor unauthorized access to data files?()
第6题:
A System p administrator needs to set the default password length for all users to six characters. Which of the following files needs to be edited to accomplish this ()
第7题:
On the hardware tab in System Properties.
In the Security Center applet in Control Panel.
In Device Manager under the File menu and options.
In Computer Management.
第8题:
RCMD
SSH
TELNET
HTTP
第9题:
verify
nslookup
sfc
chkdsk
第10题:
Thermal paste
Fans
Drive speeds
Cable management
第11题:
Verity full system functionality
Identify the main problem and question the user
Document their findings, actions, and outcomes
Escalate the issue to upper management
第12题:
aixpert -f mysec.xml
aixpert -a mysec.xml
chsec -f mysec.xml
chsec -a mysec.xml
第13题:
For the following attempts, which one is to ensure that no one employee becomes a pervasive securitythreat, that data can be recovered from backups, and that information system changes do not compromisea system’s security?()
第14题:
Which of the following is MOST critical when installing a new processor in an existing system?()
第15题:
Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()
第16题:
Which of the following tools can be used to securely connect to a remote system?()
第17题:
A System p administrator is investigating a possible security breech and wants to review information about failed login attempts to the system. Which of the following commands will show this()
第18题:
fwtmp < /etc/security/failedlogin
cat /etc/security/failedlogin
who
alog -f /etc/security/failedlogin -o
第19题:
/etc/security/limits
/etc/security/mkuser.sys
/etc/security/priv
/etc/security/user
第20题:
Honeynet
Honeypot
Vulnerability scanner
Network based IDS
第21题:
Strategic security planning
Disaster recovery
Implementation security
Operations security
第22题:
RJ-31x
RJ-11
RS-232
DB-9
第23题:
Performance Log and Alerts
Event Viewer
Security Configuration and Analysis
IP Security Monitor
第24题:
IDS
VPN
NIPS
HIDS