Which of the following provides the BEST security and accountability for a Data Center?()A. Entry loggingB. Combination locksC. Card keysD. Dead bolts

题目
Which of the following provides the BEST security and accountability for a Data Center?()

A. Entry logging

B. Combination locks

C. Card keys

D. Dead bolts


相似考题
更多“Which of the following provides the BEST security and accountability for a Data Center?() ”相关问题
  • 第1题:

    ()is preservation of confidentiality, integrity and availability of information, in addition, other properties such as authenticity, accountability, non-repudiation and reliability can also be involved。

    A、Equipment security

    B、Network security

    C、Information security

    D、Content security


    正确答案:C

  • 第2题:

    ASystempadministratorneedstosetthedefaultpasswordlengthforalluserstosixcharacters.Whichofthefollowingfilesneedstobeeditedtoaccomplishthis()

    A./etc/security/limits

    B./etc/security/mkuser.sys

    C./etc/security/priv

    D./etc/security/user


    参考答案:D

  • 第3题:

    WhatbestdescribesthefeaturesoftheCisco850Seriesrouters?()

    A.integratesdata,security,andwireless

    B.integratesdata,ecurity,wirelessandapplicationoptimization

    C.integratesvoice,data,security,wirelessandapplicationoptimization

    D.integratesdataandwireless


    参考答案:A

  • 第4题:

    Provides 3 properties that make an OS, a RTOS?


    正确答案:
     

  • 第5题:

    CiscoUnifiedCommunications500SeriesforSmallBusiness,acriticalpartoftheCiscoSmart BusinessCommunicationsSystem,isaunifiedcommunicationssolutionforsmallbusinessesthat providesvoice,data,voicemail.WhichthreefeaturesdoestheCiscoUC520support?()

    A.distributedrouting

    B.CiscoUnityExpress

    C.security,firewallandVPN

    D.analogdevices


    参考答案:B, C, D

  • 第6题:


    According to Para.7,which of the following is not the way that passage suggests to improve cyber-security?( )

    A.Be quick to predict and respond when there is insecurity.
    B.Make sure everyone is equipped with fundamental knowledge of cyber-security.
    C.Be cooperative with counterparts on cyber-security.
    D.Be cautious using Internet.

    答案:D
    解析: