单选题Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A The cell phone should require a password after a set period of inactivity.B The cel

题目
单选题
Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()
A

The cell phone should require a password after a set period of inactivity.

B

The cell phone should only be used for company related emails.

C

The cell phone data should be encrypted according to NIST standards.

D

The cell phone should have data connection abilities disabled.


相似考题
更多“单选题Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A The cell phone should require a password after a set period of inactivity.B The cel”相关问题
  • 第1题:

    Which of the following is NOT a security feature relating to user accounts?()

    • A、Some commands can be password protected requiring logged in customers to re-enter their password.
    • B、A user account can be disabled automatically, after a specified number of invalid login attempts.
    • C、An account can have multiple valid passwords at the same time, any of which can be used to access the account.
    • D、The password policy feature can allow the system to require passwords to include a minimum number of numeric characters.
    • E、Logged in customers can be logged off of the system after a specified period of inactivity.

    正确答案:C

  • 第2题:

    Which firewall best practices can help mitigate worm and other automated attacks?()

    • A、Segment security zones
    • B、Restrict access to firewalls
    • C、Use logs and alerts
    • D、Set connection limits

    正确答案:D

  • 第3题:

    Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()

    • A、The cell phone should require a password after a set period of inactivity.
    • B、The cell phone should only be used for company related emails.
    • C、The cell phone data should be encrypted according to NIST standards.
    • D、The cell phone should have data connection abilities disabled.

    正确答案:A

  • 第4题:

    A user reports that their cell phone battery is dead and cannot hold a charge. Which of the following should be done when disposing of the old battery?()

    • A、Recycle the battery.
    • B、Store the battery.
    • C、Place battery in a sealed plastic bag.
    • D、Disassemble the battery.

    正确答案:A

  • 第5题:

    An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()

    • A、The MAC can only be delivered to a mobile phone and is good for a single use only.
    • B、The MAC can be delivered by mobile phone, e-mail, or fax, and it is good for one time authentication only.
    • C、The MAC can only be delivered to a mobile phone and it is good until the expiration time is reached, as set by an administrator.
    • D、The MAC can be delivered by mobile phone, email, or fax, and it is good until the expiration time is reached, as set by an administrator.

    正确答案:B

  • 第6题:

    You are a desktop administrator for your company. A company user reports that he is unable to use his Bluetooth-enabled mobile phone with his Bluetooth-enabled Windows XP Professional computer. He is trying to play audio from the phone through the speakers on his computer. You verify that other Bluetooth devices work properly with the user’s computer. You test the speakers to make sure they are in working order. You also verify that the mobile phone can send output to a computer. You then discover that the phone cannot detect the computer.You need to ensure that the user can use the phone with his computer. What should you do?()

    • A、Place the phone in Bluetooth discovery mode.
    • B、Place the user’s computer in Bluetooth discovery mode.
    • C、Add the phone and the computer to the same Bluetooth Personal Area Network (PAN).
    • D、Install mobile phone synchronization software on the user’s computer.

    正确答案:B

  • 第7题:

    单选题
    A customer has a question about the repairs needed for their desktop computer. While asking their question to a technician, the technician receives a personal phone call on their cell phone. Which of the following should the technician do NEXT?()
    A

    Ask the customer to wait and answer the phone call.

    B

    Talk on the phone while listening to the customer.

    C

    Hand the phone to a coworker to answer the call.

    D

    Silence the phone and then listen to the customer.


    正确答案: B
    解析: 暂无解析

  • 第8题:

    多选题
    Which three actions are required to access the network statistics on a remote Cisco Unified Wireless IP Phone 7921G via a web browser?()
    A

    Browse to the phone using the MAC address of the phone.

    B

    Use HTTPS:// preceding the address of the phone.

    C

    Change web access to read/write for the MAC address of the phone on Cisco Unified Communications  Manager.

    D

    Enter the username and password of the phone.

    E

    Ensure that the host is on the same subnet as the remote phone.


    正确答案: B,D
    解析: 暂无解析

  • 第9题:

    单选题
    According to the passage, which of the following is TRUE?
    A

    Cell phone use is dangerous.

    B

    Cell phone use causes cancer.

    C

    The human brain is an electromagnetic field.

    D

    There are about 5 billion cell phone users in the world right now.


    正确答案: B
    解析:

  • 第10题:

    单选题
    According to the passage, which of the following statements is TRUE?
    A

    After the cell-phone ban is ended, students can use their phones during class.

    B

    The cell-phone ban is equally enforced in all public schools.

    C

    The cell-phone ban was put into place in 2008 under mayor Bill de Blasio.

    D

    A phone-storage industry has appeared outside the 88 metal-detector campuses.


    正确答案: B
    解析:
    根据第四段第二句“Ending the ban will also likely end an industry that has sprung up near…other devices for a dollar a day”可知,众多学校周边曾经兴起一桩生意:为青少年保存手机和其他设备,费用为一天一美元。又根据文中第三段第一句“But at the 88 city schools with metal detectors”可知是88所具有金属探测器的学校,因此可判断正确答案为D。根据文章最后一句话“It will include rules about not using the phones during class or to cheat on tests”可知,上课或考试时使用手机是不允许的,A项错误。根据文章首句“which is not equally enforced in all schools”可以判断,B项错误。根据文章第四段首句“The ban was put into place in 2007 under mayor Michael Bloomberg”可知,该禁令是2007年Michael Bloomberg实施的,因此可以判断C项错误。

  • 第11题:

    单选题
    Review the definition of the phone_list view. CHEATE OR REPLACE ALGORITHM=MERGE DEFINER= 'root'@localhost' SQL SECURITY DEFINER VIEW 'phone_list' AS SELECT e . id as id 'e . first_name AS 'first_name' 'e . last_name AS 'last_name' 'coalesce ( ph1.phone_no, ' – ') AS 'office_no' 'coalesce (ph2 .phone_no, ' – ') AS 'cell_no' FROM employees e LEFT JOIN employee_phone ph1 ON ph1.emp_id = e.id AND ph1.type = 'office' LEFT JOIN employee_phone ph2 ON ph2 .emp_id = e.id AND ph2 .type = 'mobile' The tables employees and employee_phone are InnoDB tables; all columns are used in this view. The contents of the phone_list view are as follows: Mysql> select * from phone_list; 1 row in set (0.00 sec) Which method can you use to change the cell_no value to '555-8888' for John Doe?()
    A

    INSERT INTO employee_phone (emp_id, phone_no, type) VALUES (1, '555-8888','mobile')

    B

    UPDATE phone_list SET cell_name '555-8888' WHERE first_name= 'John' and last_name= 'Doe'

    C

    DELETE FROM phone_list WHERE first_name= 'John' and last_name= 'Doe'; INSERT INTO phone_list (first_name, last_name, office_no, cell_no) VALUES ('John' , 'Doe' , 'x1234' , '555-8888)

    D

    UPDATE employee_phone SET phone_no= '555-8888' where emp_id=1


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
    A

    WEP encryption

    B

    Channel rotation

    C

    Disable SSID

    D

    WPA encryption


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Which three actions are required to access the network statistics on a remote Cisco Unified Wireless IP Phone 7921G via a web browser?()

    • A、Browse to the phone using the MAC address of the phone.
    • B、Use HTTPS:// preceding the address of the phone.
    • C、Change web access to read/write for the MAC address of the phone on Cisco Unified Communications  Manager.
    • D、Enter the username and password of the phone.
    • E、Ensure that the host is on the same subnet as the remote phone.

    正确答案:B,C,D

  • 第14题:

    A user has forgotten their BIOS password on their computer. Which of the following would atechnician use to allow the user access to their PC?()

    • A、Remove the BIOS chip on the PC
    • B、Re-flash the BIOS
    • C、Run password cracking software on the users PC
    • D、Set the password clear jumper on the motherboard

    正确答案:D

  • 第15题:

    A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat()

    • A、Incident response
    • B、Asset management
    • C、Patch management
    • D、Policies and procedures

    正确答案:C

  • 第16题:

    A customer has a question about the repairs needed for their desktop computer. While asking their question to a technician, the technician receives a personal phone call on their cell phone. Which of the following should the technician do NEXT?()

    • A、Ask the customer to wait and answer the phone call.
    • B、Talk on the phone while listening to the customer.
    • C、Hand the phone to a coworker to answer the call.
    • D、Silence the phone and then listen to the customer.

    正确答案:D

  • 第17题:

    Review the definition of the phone_list view. CHEATE OR REPLACE ALGORITHM=MERGE DEFINER= 'root'@localhost' SQL SECURITY DEFINER VIEW 'phone_list' AS SELECT e . id as id 'e . first_name AS 'first_name' 'e . last_name AS 'last_name' 'coalesce ( ph1.phone_no, ' – ') AS 'office_no' 'coalesce (ph2 .phone_no, ' – ') AS 'cell_no' FROM employees e LEFT JOIN employee_phone ph1 ON ph1.emp_id = e.id AND ph1.type = 'office' LEFT JOIN employee_phone ph2 ON ph2 .emp_id = e.id AND ph2 .type = 'mobile' The tables employees and employee_phone are InnoDB tables; all columns are used in this view. The contents of the phone_list view are as follows: Mysql> select * from phone_list; 1 row in set (0.00 sec) Which method can you use to change the cell_no value to '555-8888' for John Doe?()

    • A、INSERT INTO employee_phone (emp_id, phone_no, type) VALUES (1, '555-8888','mobile')
    • B、UPDATE phone_list SET cell_name '555-8888' WHERE first_name= 'John' and last_name= 'Doe'
    • C、DELETE FROM phone_list WHERE first_name= 'John' and last_name= 'Doe'; INSERT INTO phone_list (first_name, last_name, office_no, cell_no) VALUES ('John' , 'Doe' , 'x1234' , '555-8888)
    • D、UPDATE employee_phone SET phone_no= '555-8888' where emp_id=1

    正确答案:A

  • 第18题:

    单选题
    An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()
    A

    The MAC can only be delivered to a mobile phone and is good for a single use only.

    B

    The MAC can be delivered by mobile phone, e-mail, or fax, and it is good for one time authentication only.

    C

    The MAC can only be delivered to a mobile phone and it is good until the expiration time is reached, as set by an administrator.

    D

    The MAC can be delivered by mobile phone, email, or fax, and it is good until the expiration time is reached, as set by an administrator.


    正确答案: A
    解析: 暂无解析

  • 第19题:

    单选题
    Which of the following is NOT a security feature relating to user accounts?()
    A

    Some commands can be password protected requiring logged in customers to re-enter their password.

    B

    A user account can be disabled automatically, after a specified number of invalid login attempts.

    C

    An account can have multiple valid passwords at the same time, any of which can be used to access the account.

    D

    The password policy feature can allow the system to require passwords to include a minimum number of numeric characters.

    E

    Logged in customers can be logged off of the system after a specified period of inactivity.


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat()
    A

    Incident response

    B

    Asset management

    C

    Patch management

    D

    Policies and procedures


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()
    A

    The cell phone should require a password after a set period of inactivity.

    B

    The cell phone should only be used for company related emails.

    C

    The cell phone data should be encrypted according to NIST standards.

    D

    The cell phone should have data connection abilities disabled.


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    A user reports that their cell phone battery is dead and cannot hold a charge. Which of the following should be done when disposing of the old battery?()
    A

    Recycle the battery.

    B

    Store the battery.

    C

    Place battery in a sealed plastic bag.

    D

    Disassemble the battery.


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following is the main idea of the passage?
    A

    New York City will give financial aid to poor students.

    B

    New York City plans to restrict cell phone use in libraries.

    C

    New York City plans to install metal detectors in all public schools.

    D

    New York City will soon end a ban on cell phones in schools.


    正确答案: D
    解析:
    文章第一部分即第一段,点明主旨,提出将结束引起争议的手机禁令。第二部分包括第二、三、四、五段,指出这项禁令的实施所带来的利与弊。第三部分即第六段,指出教育部因此决定创建一个新的政策。由此可知正确答案为D(纽约很快会结束学校的手机禁令)。A、B项与主题不符,C项只是文章中的一个细节,只有D项才是文章的主要内容。

  • 第24题:

    单选题
    You are a desktop administrator for your company. A company user reports that he is unable to use his Bluetooth-enabled mobile phone with his Bluetooth-enabled Windows XP Professional computer. He is trying to play audio from the phone through the speakers on his computer. You verify that other Bluetooth devices work properly with the user’s computer. You test the speakers to make sure they are in working order. You also verify that the mobile phone can send output to a computer. You then discover that the phone cannot detect the computer.You need to ensure that the user can use the phone with his computer. What should you do?()
    A

    Place the phone in Bluetooth discovery mode.

    B

    Place the user’s computer in Bluetooth discovery mode.

    C

    Add the phone and the computer to the same Bluetooth Personal Area Network (PAN).

    D

    Install mobile phone synchronization software on the user’s computer.


    正确答案: B
    解析: 暂无解析