System and application access control is to prevent( )access to systems and applications.Access to information and application system functions shall be restricted in accordance with the access control policy.A.physical B.special C.authorized D.unauthoriz

题目
System and application access control is to prevent( )access to systems and applications.Access to information and application system functions shall be restricted in accordance with the access control policy.

A.physical
B.special
C.authorized
D.unauthorized

相似考题
更多“System and application access control is to prevent( )access to systems and applications.Access to information and application system functions shall be restricted in accordance with the access contr”相关问题
  • 第1题:

    The objective of ( )is to determine what parts of the application software will be assigned to what hardware.The major software components of the system being developed have to be identified and then allocated to the various hardware components on which the system will operate. All software systems can be divided into four basic functions. The first is( ). Most information systems require data to be stored and retrieved,whether a small file,such as a memo produced by a word processor,or a large database,such as one that stores an organization’s accounting records. The second function is the ( ),the processing required to access data,which often means database queries in Structured Query Language. The third function is the ( ),which is the logic documented in the DFDs,use cases,and functional requirements.The fourth function is the presentation logic,the display of information to the user and the acceptance of the user’s commands.The three primary hardware components of a system are ( ).

    A.architecture design B.modular design C.physical design D.distribution design A.data access components B.database management system C.data storage D.data entities A.data persistence B.data access objects C.database connection D.dataaccess logic A.system requirements B.system architecture C.application logic D.application program A.computers,cables and network B.clients,servers,and network C.CPUs,memories and I/O devices D.CPUs,hard disks and I/O devices


    正确答案:A,C,D,C,B

  • 第2题:

    The meaning of ( ) is that access to protected information used be restricted to people who are authorized to access the information.

    A.digital signature
    B.encryption technology
    C.access control
    D.authentication technology

    答案:C
    解析:
    翻译:( )的含义是,对受保护信息的访问必须限于被授权访问该信息的人。A. 数字签名B. 加密技术C.访问控制D.认证技术

  • 第3题:

    The objective of (71) is to determine what parts of the application software will be assigned to what hardware. The major software components of the system being developed have to be identified and then allocated to the various hardware components on which the system will operate. All software systems can be divided into four basic functions. The first is (72). Most information systems require data to be stored and retrieved, whether a small file, such as a memo produced by a word processor, or a large database, such as one that stores an organization's accounting records. The second function is the (请作答此空), the processing required to access data, which often means database queries in Structured Query Language. The third function is the (74), which is the logic documented in the DFDs, use cases, and functional requirements. The fourth function is the presentation logic, the display of information to the user and the acceptance of the user's commands. The three primary hardware components of a system are (75).

    A. data persistence
    B .data access objects
    C. database connection
    D. data access logic

    答案:D
    解析:
    架构设计的目标是确定应用软件的哪些部分将被分配到何种硬件。识别出正在开发系统的主要软件构件并分配到系统将要运行的硬件构件。所有软件系统可分为四项基本功能。首项是数据存储。大多数信息系统需要数据进行存储并检索,无论是一个小文件,比如一个字处理器产生的一个备忘录,还是一个大型数据库,比如存储一个企业会计记录的数据库。第二项功能是数据访问逻辑,处理过程需要访问数据,这通常是指用SQL进行数据库查询。第三项功能是应用程序逻辑,这些逻辑通过数据流图,用例和功能需求来记录。第四项功能是表示逻辑,给用户显示信息并接收用户命令。一个系统的三类主要硬件构件是客户机、服务器和网络。

  • 第4题:

    The objective of()is to determine what parts of the application software will be assigned to what hardware. The major software components of the system being developed have to be identified and then allocated to the various hardware components on which the system will operate. All software systems can be divided into four basic functions. The first is(请作答此空 ).Most information systems require data to be stored and retrieved, whether a small file,such as a memo produced by a word processor, or a large database, such as one that stores an organization's accounting records.The second function is the(),the processing required to access data, which often means database queries in Structured Query Language. The third function is the(),which is the logic documented in the DFDs, use cases,and functional requirements.The fourth function is the presentation logic,the display of information to the user and the acceptance of the user's commands.The three primary hardware components of a system are ().


    A. data access components
    B. database management system
    C.data storage
    D.data entities

    答案:C
    解析:
    ()的目标是确定应用软件的哪些部分将分配到何种硬件。识别出正在开发系统的主要软件构件并分配到系统将要运行的硬件构件。所有软件系统可分为四项基本功能。第一项是(请作答此空 )。大多数信息系统需要数据进行存储并检索,不论是一个小文件,比如一个字处理器产生的一个备忘录,还是一个大型数据库,比如存储一个企业会计记录的数据库。第二项功能是(),处理过程需要访问数据,这通常是指用SQL进行数据库查询。第三项功能是(),这些逻辑通过数据流图,用例和功能需求来记录。第四项功能是表示逻辑,给用户显示信息并接收用户命令。一个系统的三类主要硬件构件是()。A.数据访问组件 B.数据库管理系统 C.数据存储 D.数据实体

  • 第5题:

    The objective of()is to determine what parts of the application software will be assigned to what hardware. The major software components of the system being developed have to be identified and then allocated to the various hardware components on which the system will operate. All software systems can be divided into four basic functions. The first is().Most information systems require data to be stored and retrieved, whether a small file,such as a memo produced by a word processor, or a large database, such as one that stores an organization's accounting records.The second function is the(),the processing required to access data, which often means database queries in Structured Query Language. The third function is the(请作答此空 ),which is the logic documented in the DFDs, use cases,and functional requirements.The fourth function is the presentation logic,the display of information to the user and the acceptance of the user's commands.The three primary hardware components of a system are ().


    A. system requirements
    B. system architecture
    C.application logic
    D.application program

    答案:C
    解析:
    ()的目标是确定应用软件的哪些部分将分配到何种硬件。识别出正在开发系统的主要软件构件并分配到系统将要运行的硬件构件。所有软件系统可分为四项基本功能。第一项是()。大多数信息系统需要数据进行存储并检索,不论是一个小文件,比如一个字处理器产生的一个备忘录,还是一个大型数据库,比如存储一个企业会计记录的数据库。第二项功能是(),处理过程需要访问数据,这通常是指用SQL进行数据库查询。第三项功能是(请作答此空 ),这些逻辑通过数据流图,用例和功能需求来记录。第四项功能是表示逻辑,给用户显示信息并接收用户命令。一个系统的三类主要硬件构件是()。A.系统需求 B.系统架构 C.应用程序逻辑 D.应用程序

  • 第6题:

    The Cisco Smart Business Communications System offers support of third-party applications. What is the primary purpose of the VeraSMART application?()  

    • A、 present relevant customer information
    • B、 interpret detail call records
    • C、 access shop data
    • D、 manage and remediate network problems

    正确答案:A

  • 第7题:

    What are two functions that WLAN management provides? ()

    • A、 enhances security
    • B、 system tests
    • C、 accommodates additional routers
    • D、 simplifies daily operations
    • E、 uses standalone access points

    正确答案:A,D

  • 第8题:

    Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()

    • A、Events log
    • B、System log
    • C、User Access log
    • D、Admin Access log

    正确答案:A

  • 第9题:

    You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You manage a server that runs Windows Server 2008. The server hasTerminal Service Web Access (TS Web Access) installed. Several line-of-business applications areavailable on the server by using TS Web Access. You have a new application installed on the server. Youhave to make the application available through TS Web Access. In order to achieve this,What action should you perform?()

    • A、In order to make the application available through TS Web Access, the data source for TS Web Accessshould be specified from the TS Web Access Web site.
    • B、In order to make the application available through TS Web Access, the application should be added to the RemoteApp Programs list from TS RemoteApp Manager.
    • C、In order to make the application available through TS Web Access, the users should be added to the TS Web Access Computers group from the Local Users and Groups snap-in.
    • D、In order to make the application available through TS Web Access, the mstsc.exe command should be run and specify the /v parameter should be specified from the command prompt.

    正确答案:B

  • 第10题:

    多选题
    A Mysql instance is running on a dedicated server. Developers access the server from the same network subnet. Users access the database through an application that is running on a separate server in a DMZ. Which two will optimize the security of this setup?()
    A

    Disabling connections from named pipes or socket files (depending on the operating system of the server)

    B

    Enabling and using SSL for connections to the Mysql database

    C

    Installing Mysql on the application server, and running the database and application on the same server

    D

    Starting the server with – bind- address=0.0.0.0 specified

    E

    Running the server with – skip-networking specified

    F

    Limiting logins to originate from the application server or the server's subnet'


    正确答案: C,E
    解析: 暂无解析

  • 第11题:

    单选题
    You are the network administrator for your company. Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003. You add eight servers for a new application. You create an organizational unit (OU) named Application to hold the servers and other resources for the application. Users and groups in the domain will need varied permissions on the application servers. The members of a global group named Server Access Team need to be able to grant access to the servers. The Server Access Team group does not need to be able to perform any other tasks on the servers. You need to allow the Server Access Team group to grant permissions for the application servers without granting the Server Access Team group unnecessary permissions.  What should you do?()
    A

     Create a Group Policy object (GPO) for restricted groups. Configure the GPO to make the Server Access Team group a member of the Power Users group on each application server. Link the GPO to the Application OU.

    B

     Grant the Server Access Team group permissions to modify computer objects in the Application OU.

    C

     Move the Server Access Team group object into the Application OU.

    D

     Create domain local groups that grant access to the application servers. Grant the Server Access Team group permissions to modify the membership of the domain local groups.


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    What feature on the WSA provides Day Zero Revocation of access to third party sites such as Salesforce?()
    A

     Day Zero Revocation engine

    B

     SaaS Access Control

    C

     Dynamic Vectoring and Streaming engine

    D

     Application Visibility and Control


    正确答案: A
    解析: 暂无解析

  • 第13题:

    In the fields of physical security and information security,access control is the selective restriction of access to a place or other resource.The act of accessing may mean consuming,entering,or using.Permission to access a resource is called authorization(授权).

    An access control mechanism(71)between a user(or a process executing on behalf of a user)and system resources,such as applications,operating systems,firewalls,routers,files,and databases.The system must first authenticate(验证)a user seeking access.Typically the authentication function determines whether the user is(72)to access the system at all.Then the access control function determines if the specific requested access by this user is permitted.A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user.The access control function consults this database to determine whether to(73)access.An auditing function monitors and keeps a record of user accesses to system resources.

    In practice,a number of(74)may cooperatively share the access control function.All operating systems have at least a rudimentary(基本的),and in many cases a quite robust,access control component.Add-on security packages can add to the(75)access control capabilities of the OS.Particular applications or utilities,such as a database management system,also incorporate access control functions.External devices,such as firewalls,can also provide access control services.

    A.cooperates

    B.coordinates

    C.connects

    D.mediates


    正确答案:C

  • 第14题:

    The objective of (请作答此空) is to determine what parts of the application software will be assigned to what hardware. The major software components of the system being developed have to be identified and then allocated to the various hardware components on which the system will operate. All software systems can be divided into four basic functions. The first is (72). Most information systems require data to be stored and retrieved, whether a small file, such as a memo produced by a word processor, or a large database, such as one that stores an organization's accounting records. The second function is the (73), the processing required to access data, which often means database queries in Structured Query Language. The third function is the (74), which is the logic documented in the DFDs, use cases, and functional requirements. The fourth function is the presentation logic, the display of information to the user and the acceptance of the user's commands. The three primary hardware components of a system are (75).


    A.architecture design
    B. modular design
    C. physical design
    D.distribution design

    答案:A
    解析:
    架构设计的目标是确定应用软件的哪些部分将被分配到何种硬件。识别出正在开发系统的主要软件构件并分配到系统将要运行的硬件构件。所有软件系统可分为四项基本功能。首项是数据存储。大多数信息系统需要数据进行存储并检索,无论是一个小文件,比如一个字处理器产生的一个备忘录,还是一个大型数据库,比如存储一个企业会计记录的数据库。第二项功能是数据访问逻辑,处理过程需要访问数据,这通常是指用SQL进行数据库查询。第三项功能是应用程序逻辑,这些逻辑通过数据流图,用例和功能需求来记录。第四项功能是表示逻辑,给用户显示信息并接收用户命令。一个系统的三类主要硬件构件是客户机、服务器和网络。

  • 第15题:

    The objective of (71) is to determine what parts of the application software will be assigned to what hardware. The major software components of the system being developed have to be identified and then allocated to the various hardware components on which the system will operate. All software systems can be divided into four basic functions. The first is (72). Most information systems require data to be stored and retrieved, whether a small file, such as a memo produced by a word processor, or a large database, such as one that stores an organization's accounting records. The second function is the (73), the processing required to access data, which often means database queries in Structured Query Language. The third function is the (请作答此空), which is the logic documented in the DFDs, use cases, and functional requirements. The fourth function is the presentation logic, the display of information to the user and the acceptance of the user's commands. The three primary hardware components of a system are (75).


    A. system requirements
    B. system architecture
    C.application logic
    D.application program

    答案:C
    解析:
    架构设计的目标是确定应用软件的哪些部分将被分配到何种硬件。识别出正在开发系统的主要软件构件并分配到系统将要运行的硬件构件。所有软件系统可分为四项基本功能。首项是数据存储。大多数信息系统需要数据进行存储并检索,无论是一个小文件,比如一个字处理器产生的一个备忘录,还是一个大型数据库,比如存储一个企业会计记录的数据库。第二项功能是数据访问逻辑,处理过程需要访问数据,这通常是指用SQL进行数据库查询。第三项功能是应用程序逻辑,这些逻辑通过数据流图,用例和功能需求来记录。第四项功能是表示逻辑,给用户显示信息并接收用户命令。一个系统的三类主要硬件构件是客户机、服务器和网络。

  • 第16题:

    The objective of( 请作答此空 )is to determine what parts of the application software will be assigned to what hardware. The major software components of the system being developed have to be identified and then allocated to the various hardware components on which the system will operate. All software systems can be divided into four basic functions. The first is().Most information systems require data to be stored and retrieved, whether a small file,such as a memo produced by a word processor, or a large database, such as one that stores an organization's accounting records.The second function is the(),the processing required to access data, which often means database queries in Structured Query Language. The third function is the (),which is the logic documented in the DFDs, use cases,and functional requirements.The fourth function is the presentation logic,the display of information to the user and the acceptance of the user's commands.The three primary hardware components of a system are ().


    A.architecture design
    B. modular design
    C. physical design
    D.distribution design

    答案:A
    解析:
    (请作答此空 )的目标是确定应用软件的哪些部分将分配到何种硬件。识别出正在开发系统的主要软件构件并分配到系统将要运行的硬件构件。所有软件系统可分为四项基本功能。第一项是()。大多数信息系统需要数据进行存储并检索,不论是一个小文件,比如一个字处理器产生的一个备忘录,还是一个大型数据库,比如存储一个企业会计记录的数据库。第二项功能是(),处理过程需要访问数据,这通常是指用SQL进行数据库查询。第三项功能是(),这些逻辑通过数据流图,用例和功能需求来记录。第四项功能是表示逻辑,给用户显示信息并接收用户命令。一个系统的三类主要硬件构件是()。A.架构设计 B.模块化设计 C.物理设计 D.分布式设计

  • 第17题:

    Which three devices are used by the Cisco Wireless Control System (WCS) for wireless management?()

    • A、WLAN controllers
    • B、WLAN Solution Engine (WLSE)
    • C、Cisco Wireless Control System (WCS)
    • D、Cisco Wireless Location Appliance
    • E、lightweight access point (AP)
    • F、autonomous access point (AP)

    正确答案:A,D,E

  • 第18题:

    What feature on the WSA provides Day Zero Revocation of access to third party sites such as Salesforce?()

    • A、 Day Zero Revocation engine
    • B、 SaaS Access Control
    • C、 Dynamic Vectoring and Streaming engine
    • D、 Application Visibility and Control

    正确答案:B

  • 第19题:

    In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()

    • A、to specify the destination addresses to which access is permitted
    • B、to specify the source address permitted to access the resource
    • C、to specify the services to which access is permitted
    • D、to inform the enforcer to expect policy information from the Junos Pulse Access Control Service

    正确答案:D

  • 第20题:

    You have a Web application that is configured for personalization. You need to access personalization data from one of the pages of the Web application by using the minimum amount of administrative effort. What should you do? ()

    • A、Access the personalization data from the Session property of the HttpContext object.
    • B、Access the personalization data from the Application property of the HttpContext object.
    • C、Access the personalization data from the Cache property of the HttpContext object.
    • D、Access the personalization data from the Profile property of the HttpContext object.

    正确答案:D

  • 第21题:

    You need to provide users in the research department access to different functions of the Web-based research application based on individual user roles. What should you do?()

    • A、Use Windows directory service mapper and enable Microsoft .NET Passport authentication
    • B、Create authorization rules and scopes by using Authorization Manager
    • C、Use one-to-many client certificate mapping
    • D、Define permissions by using access control lists (ACLs)

    正确答案:B

  • 第22题:

    单选题
    Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()
    A

    Events log

    B

    System log

    C

    User Access log

    D

    Admin Access log


    正确答案: B
    解析: 暂无解析

  • 第23题:

    多选题
    Which three devices are used by the Cisco Wireless Control System (WCS) for wireless management?()
    A

    WLAN controllers

    B

    WLAN Solution Engine (WLSE)

    C

    Cisco Wireless Control System (WCS)

    D

    Cisco Wireless Location Appliance

    E

    lightweight access point (AP)

    F

    autonomous access point (AP)


    正确答案: A,D,E
    解析: 暂无解析