更多“单选题Why is it important to prevent the abuse of computer data bands?A To protect the right of the individual.B To maintain discipline in society.C To encourage economic and social research.D To collect wide-ranging information.”相关问题
  • 第1题:

    Why would a network administrator configure port security on a switch?()

    • A、to prevent unauthorized Telnet access to a switch port
    • B、to limit the number of Layer 2 broadcasts on a particular switch port
    • C、to prevent unauthorized hosts from accessing the LAN
    • D、to protect the IP and MAC address of the switch and associated ports
    • E、to block unauthorized access to the switch management interfaces over common TCP ports

    正确答案:C

  • 第2题:

    ()is not a physical wall, but a lot of virtual data to protect the computer network.

    • A、Data wall  
    • B、Data Channel  
    • C、Data base  
    • D、firewall

    正确答案:D

  • 第3题:

    Which of the following helps protect important confidential information from being publiclydisclosed?()

    • A、Hard drive wiping
    • B、Social Engineering
    • C、Classification
    • D、RAS server

    正确答案:C

  • 第4题:

    You are the administrator of Redington Incorporation. Your optical disks are managed by one of your assistants named Jane and she is having a problem with one application failing to get requested information. You ask her to show you some history on the operation. Where will Jane find the information you want?()

    • A、Under Administrative Tools, click on Performance. From Performance Logs and Alerts, view  the Alerts.
    • B、Right click My Computer, Manage, Storage, Removable Storage, Work Queue. 
    • C、Right click My Computer, and under System Tools, click on System Information. Expand  Software Enironment. Double click on Running Tasks.
    • D、Right click My Computer, and under System Tools, click on Event Viewer, then Application.  Click on the Source column to sort the application data.

    正确答案:B

  • 第5题:

    A technician is servicing the Human Resource director’s computer which contains payroll software and salary information. Which of the following should the technician do to ensure confidentiality of the payroll information?()

    • A、Backup the confidential data to the technician’s USB drive to ensure nothing is accidently deleted.
    • B、Uninstall the payroll software to ensure confidentiality.
    • C、Have the director remove sensitive data before the computer will be repaired.
    • D、Perform needed repairs while avoiding sensitive data.

    正确答案:D

  • 第6题:

    单选题
    Why is QoS important in a converged network?()
    A

    Because data does not need to arrive intact, so data transfer rates can be variable

    B

    Because lost voice-data packets must be retransmitted

    C

    Because voice data packets should arrive quickly and sequentially, and with no lost data

    D

    Because voice data packets must follow a single dedicated path through the network


    正确答案: B
    解析: 暂无解析

  • 第7题:

    单选题
    Which of the following best describes how locks are used in DB2?()
    A

    To maintain control of updated rows for commit processing

    B

    To ensure only committed changes are altered by another application

    C

    To allow two applications to update the same row of data simultaneously

    D

    To prevent multiple applications from accessing the same data simultaneously


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    Why would a network administrator configure port security on a switch?()
    A

    to prevent unauthorized Telnet access to a switch port

    B

    to limit the number of Layer 2 broadcasts on a particular switch port

    C

    to prevent unauthorized hosts from accessing the LAN

    D

    to protect the IP and MAC address of the switch and associated ports

    E

    to block unauthorized access to the switch management interfaces over common TCP ports


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    Why is it important to prevent the abuse of computer data bands?
    A

    To protect the right of the individual.

    B

    To maintain discipline in society.

    C

    To encourage economic and social research.

    D

    To collect wide-ranging information.


    正确答案: C
    解析:
    从第二段中的but they are bought at too high a price if they endanger human freedom or seriously enhance their opportunities of blackmailers可知,防止计算机数据库被滥用是基于对“human freedom”的考虑,即保护个人权利(right of the individual)。因此,A项为正确答案。

  • 第10题:

    单选题
    ()is not a physical wall, but a lot of virtual data to protect the computer network.
    A

    Data wall  

    B

    Data Channel  

    C

    Data base  

    D

    firewall


    正确答案: D
    解析: 中文:防火墙不是一个实际的墙,它是利用一些虚拟的数据来保护电脑。

  • 第11题:

    单选题
    You have a computer that runs Windows XP Professional. The computer is configured as a Simple Network Management Protocol (SNMP) agent and is monitored by an SNMP management server.  You install Windows XP Professional Service Pack 2 (SP2) and Windows Defender on the computer. You discover that the SNMP management server can no longer collect SNMP data from the computer. You need to ensure that the SNMP management server can collect data from the Windows XP Professional computer.  What should you do?()
    A

    Reinstall the SNMP.

    B

    Perform a Windows Update.

    C

    Uninstall Windows Defender. 

    D

    Create an exception in Windows Firewall. 


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    In American economy, the basic role of the federal government is _____.
    A

    to levy taxes on any business

    B

    to issue money for economy

    C

    to set up banking and control money supply

    D

    to improve markets and protect each economic element from abuse


    正确答案: B
    解析:
    联邦政府的基本作用是改善市场和保护每一种经济元素。

  • 第13题:

    ()is not a physical wall but a flow virtual data to protect the computer network.

    • A、data wall 
    • B、data channel 
    • C、database 
    • D、firewall

    正确答案:D

  • 第14题:

    () is not a physical wall, but a lot of virtual data to protect the computer network.

    • A、Date wall   
    • B、Date channel   
    • C、Database   
    • D、Firewall

    正确答案:D

  • 第15题:

    Which of the following best describes how locks are used in DB2?()

    • A、To maintain control of updated rows for commit processing
    • B、To ensure only committed changes are altered by another application
    • C、To allow two applications to update the same row of data simultaneously
    • D、To prevent multiple applications from accessing the same data simultaneously

    正确答案:B

  • 第16题:

    You have a computer that runs Windows XP Professional. The computer is configured as a Simple Network Management Protocol (SNMP) agent and is monitored by an SNMP management server.  You install Windows XP Professional Service Pack 2 (SP2) and Windows Defender on the computer. You discover that the SNMP management server can no longer collect SNMP data from the computer. You need to ensure that the SNMP management server can collect data from the Windows XP Professional computer.  What should you do?()

    • A、Reinstall the SNMP.
    • B、Perform a Windows Update.
    • C、Uninstall Windows Defender. 
    • D、Create an exception in Windows Firewall. 

    正确答案:D

  • 第17题:

    单选题
    Parents and children often disagree about what is important or right because _____.
    A

    they have different styles of life

    B

    they hate each other

    C

    parents think that their children are troublemakers

    D

    they are in a society of rapidly changing social and moral values


    正确答案: A
    解析:
    细节题。根据第二段的首句“But in a society of rapidly changing social and moral values, parents and children often disagree about what is important and what is right”可知答案应为D项。

  • 第18题:

    单选题
    Your company has an Active Directory domain. All consultants belong to a global group named  TempWorkers. The TempWorkers group is not nested in any other groups.   You move the computer objects of three file servers to a new organizational unit named  SecureServers. These file servers contain only confidential data in shared folders.    You need to prevent members of the TempWorkers group from accessing the confidential data  on the file servers. You must achieve this goal without affecting access to other domain  resources.     What should you do()
    A

    Create a new GPO and link it to the SecureServers organizational unit. Assign the Deny access to this computer fro

    B

    Create a new GPO and link it to the domain. Assign the Deny access to this computer from the network user right to

    C

    Create a new GPO and link it to the domain. Assign the Deny log on locally user right to the TempWorkers global g

    D

    Create a new GPO and link it to the SecureServers organizational unit. Assign the Deny log on locally user right to


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    Your company has an Active Directory domain. All consultants belong to a global group named   TempWorkers. The TempWorkers group is not nested in any other groups.   You move the computer objects of three file servers to a new organizational unit named SecureServers.   These file servers contain only confidential data in shared folders.   You need to prevent members of the TempWorkers group from accessing the confidential data on the file  servers. You must achieve this goal without affecting access to other domain resources.   What should you do()
    A

    Create a new GPO and link it to the SecureServers organizational unit. Assign the Deny access to this  computer from the network user right to the TempWorkers global group.

    B

    Create a new GPO and link it to the domain. Assign the Deny access to this computer from the network  user right to the TempWorkers global group.

    C

    Create a new GPO and link it to the domain. Assign the Deny log on locally user right to the  TempWorkers global group.

    D

    Create a new GPO and link it to the SecureServers organizational unit. Assign the Deny log on locallyuser right to the TempWorkers global group.


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    A technician is servicing the Human Resource director’s computer which contains payroll software and salary information. Which of the following should the technician do to ensure confidentiality of the payroll information?()
    A

    Backup the confidential data to the technician’s USB drive to ensure nothing is accidently deleted.

    B

    Uninstall the payroll software to ensure confidentiality.

    C

    Have the director remove sensitive data before the computer will be repaired.

    D

    Perform needed repairs while avoiding sensitive data.


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    The most important principle in the stowage is().
    A

    to ensure the safety of the ship and protect the cargo from being damaged

    B

    to avoid the rearrangement of the cargo loaded on board

    C

    to reject the damaged cargo during loading

    D

    to prevent the spontaneous combustion of coal and grain


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    () is not a physical wall, but a lot of virtual data to protect the computer network.
    A

    Date wall   

    B

    Date channel   

    C

    Database   

    D

    Firewall


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    You have a computer that runs Windows 7 Professional. A removable drive is attached to the computer.You need to protect data on the removable drive by using BitLocker To Go.  What should you do first? ()
    A

    Upgrade the computer to Windows 7 Enterprise.

    B

    Install all Windows Updates for Windows 7 Professional.

    C

    Issue a digital certificate for the Encrypting File System (EFS).

    D

    Select the Encrypt contents to secure data checkbox from the properties on the removable drive.


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    A consultant has been asked to do a performance analysis on a database server.  Which subsystem should the consultant first analyze and why?()
    A

    CPU,because the database replication process requires a considerable amount of CPU time

    B

    Memory,because the buffer cache requires a large amount of memory to maintain the data in system memory

    C

    Disk,because it is important to configure a sufficient number of disks to match the CPU processing power

    D

    Network,because the data returned to the client from the server can be a large subset of the total database


    正确答案: C
    解析: 暂无解析