The cell phone should require a password after a set period of inactivity.
The cell phone should only be used for company related emails.
The cell phone data should be encrypted according to NIST standards.
The cell phone should have data connection abilities disabled.
第1题:
Which of the following is NOT a security feature relating to user accounts?()
第2题:
Which firewall best practices can help mitigate worm and other automated attacks?()
第3题:
Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()
第4题:
A user reports that their cell phone battery is dead and cannot hold a charge. Which of the following should be done when disposing of the old battery?()
第5题:
An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()
第6题:
You are a desktop administrator for your company. A company user reports that he is unable to use his Bluetooth-enabled mobile phone with his Bluetooth-enabled Windows XP Professional computer. He is trying to play audio from the phone through the speakers on his computer. You verify that other Bluetooth devices work properly with the user’s computer. You test the speakers to make sure they are in working order. You also verify that the mobile phone can send output to a computer. You then discover that the phone cannot detect the computer.You need to ensure that the user can use the phone with his computer. What should you do?()
第7题:
Ask the customer to wait and answer the phone call.
Talk on the phone while listening to the customer.
Hand the phone to a coworker to answer the call.
Silence the phone and then listen to the customer.
第8题:
Browse to the phone using the MAC address of the phone.
Use HTTPS:// preceding the address of the phone.
Change web access to read/write for the MAC address of the phone on Cisco Unified Communications Manager.
Enter the username and password of the phone.
Ensure that the host is on the same subnet as the remote phone.
第9题:
Cell phone use is dangerous.
Cell phone use causes cancer.
The human brain is an electromagnetic field.
There are about 5 billion cell phone users in the world right now.
第10题:
After the cell-phone ban is ended, students can use their phones during class.
The cell-phone ban is equally enforced in all public schools.
The cell-phone ban was put into place in 2008 under mayor Bill de Blasio.
A phone-storage industry has appeared outside the 88 metal-detector campuses.
第11题:
INSERT INTO employee_phone (emp_id, phone_no, type) VALUES (1, '555-8888','mobile')
UPDATE phone_list SET cell_name '555-8888' WHERE first_name= 'John' and last_name= 'Doe'
DELETE FROM phone_list WHERE first_name= 'John' and last_name= 'Doe'; INSERT INTO phone_list (first_name, last_name, office_no, cell_no) VALUES ('John' , 'Doe' , 'x1234' , '555-8888)
UPDATE employee_phone SET phone_no= '555-8888' where emp_id=1
第12题:
WEP encryption
Channel rotation
Disable SSID
WPA encryption
第13题:
Which three actions are required to access the network statistics on a remote Cisco Unified Wireless IP Phone 7921G via a web browser?()
第14题:
A user has forgotten their BIOS password on their computer. Which of the following would atechnician use to allow the user access to their PC?()
第15题:
A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat()
第16题:
A customer has a question about the repairs needed for their desktop computer. While asking their question to a technician, the technician receives a personal phone call on their cell phone. Which of the following should the technician do NEXT?()
第17题:
Review the definition of the phone_list view. CHEATE OR REPLACE ALGORITHM=MERGE DEFINER= 'root'@localhost' SQL SECURITY DEFINER VIEW 'phone_list' AS SELECT e . id as id 'e . first_name AS 'first_name' 'e . last_name AS 'last_name' 'coalesce ( ph1.phone_no, ' – ') AS 'office_no' 'coalesce (ph2 .phone_no, ' – ') AS 'cell_no' FROM employees e LEFT JOIN employee_phone ph1 ON ph1.emp_id = e.id AND ph1.type = 'office' LEFT JOIN employee_phone ph2 ON ph2 .emp_id = e.id AND ph2 .type = 'mobile' The tables employees and employee_phone are InnoDB tables; all columns are used in this view. The contents of the phone_list view are as follows: Mysql> select * from phone_list; 1 row in set (0.00 sec) Which method can you use to change the cell_no value to '555-8888' for John Doe?()
第18题:
The MAC can only be delivered to a mobile phone and is good for a single use only.
The MAC can be delivered by mobile phone, e-mail, or fax, and it is good for one time authentication only.
The MAC can only be delivered to a mobile phone and it is good until the expiration time is reached, as set by an administrator.
The MAC can be delivered by mobile phone, email, or fax, and it is good until the expiration time is reached, as set by an administrator.
第19题:
Some commands can be password protected requiring logged in customers to re-enter their password.
A user account can be disabled automatically, after a specified number of invalid login attempts.
An account can have multiple valid passwords at the same time, any of which can be used to access the account.
The password policy feature can allow the system to require passwords to include a minimum number of numeric characters.
Logged in customers can be logged off of the system after a specified period of inactivity.
第20题:
Incident response
Asset management
Patch management
Policies and procedures
第21题:
The cell phone should require a password after a set period of inactivity.
The cell phone should only be used for company related emails.
The cell phone data should be encrypted according to NIST standards.
The cell phone should have data connection abilities disabled.
第22题:
Recycle the battery.
Store the battery.
Place battery in a sealed plastic bag.
Disassemble the battery.
第23题:
New York City will give financial aid to poor students.
New York City plans to restrict cell phone use in libraries.
New York City plans to install metal detectors in all public schools.
New York City will soon end a ban on cell phones in schools.
第24题:
Place the phone in Bluetooth discovery mode.
Place the user’s computer in Bluetooth discovery mode.
Add the phone and the computer to the same Bluetooth Personal Area Network (PAN).
Install mobile phone synchronization software on the user’s computer.