网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following is NOT a security feature relating to user accounts?()
A

Some commands can be password protected requiring logged in customers to re-enter their password.

B

A user account can be disabled automatically, after a specified number of invalid login attempts.

C

An account can have multiple valid passwords at the same time, any of which can be used to access the account.

D

The password policy feature can allow the system to require passwords to include a minimum number of numeric characters.

E

Logged in customers can be logged off of the system after a specified period of inactivity.


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following is NOT a security feature relating to user accounts?()A Some commands can be password protected requiring logged in customers to re-enter their password.B A user account can be disabled automatically, after a specified number of invalid login attempts.C An account can have multiple valid passwords at the same time, any of which can be used to access the account.D The password policy feature can allow the system to require passwords to include a minimum number of numeric characters.E Logged in customers can be logged off of the system after a specified period of inactivity.” 相关考题
考题 Which of the following is BEST for providing network security?() A.FirewallB.DMZC.SwitchD.IDS

考题 Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?() A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS

考题 Session affinity is a feature of which of the following devices?() A. DNS serverB. DHCP serverC. Load balancerD. IPS

考题 Which of the following is not a design feature of human language?A.Arbitrariness B.Displacement C.Duality D.Diachronicity

考题 The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()A、 security contextsB、- transparent firewallC、 WebVPND、 Active/Active failoverE、 low latency queuingF、 AIP-SSM intrusion prevention

考题 RMAN provides more granular catalog security through which feature?()A、Virtual private databaseB、Virtual private catalogC、RMAN virtual databaseD、RMAN secure catalogE、Oracle Database Vault

考题 Which Cisco PIX and ASA feature provides reliable, comprehensive security against virus and worm propagation, as well as data theft?  ()A、 WebVPN for SSLB、 IPSecC、 AIMD、 Stateful packet inspection

考题 Which of the following is BEST for providing network security?()A、FirewallB、DMZC、SwitchD、IDS

考题 Which of the following security threats involves making phone calls?()A、PhishingB、VishingC、DDoSD、Xmas attack

考题 Which of the following is a built-in feature of FAT?()A、 8.3 name conventionB、 Fault toleranceC、 EncryptionD、 Compression

考题 Which of the following does not affect security on a wireless access point?()A、EncryptionB、DHCPC、PasswordD、SSID

考题 A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()A、WEPB、Port filteringC、WPAD、Longer SSID broadcast intervals

考题 Which of the following are examples of physical security measures?()A、Policies and proceduresB、EncryptionC、Locked doorsD、Security personnelE、Backup tapes

考题 Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS

考题 A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()A、fwtmp  /etc/security/failedloginB、cat /etc/security/failedloginC、whoD、alog -f /etc/security/failedlogin -o

考题 Which of the following options should be used to obtain the latest security patches for AIX?()A、FixDistB、The Bonus Pack CDC、OPSD、The Security Maintenance CD

考题 A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user

考题 The root id is set so that direct login is disabled.  Information must be reviewed relating to when root access was obtained.  In which of the following files is this information located?()A、 /var/adm/sulog B、 /var/adm/wtmp C、 /etc/security/user D、 /etc/security/failedlogin

考题 多选题The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()Asecurity contextsB- transparent firewallCWebVPNDActive/Active failoverElow latency queuingFAIP-SSM intrusion prevention

考题 多选题Which of the following are examples of physical security measures?()APolicies and proceduresBEncryptionCLocked doorsDSecurity personnelEBackup tapes

考题 单选题Which of the following is NOT a suprasegrnental feature?A PitchB StressC ToneD Intonation

考题 单选题The root id is set so that direct login is disabled.  Information must be reviewed relating to when root access was obtained.  In which of the following files is this information located?()A  /var/adm/sulog B  /var/adm/wtmp C  /etc/security/user D  /etc/security/failedlogin

考题 单选题Which of the following is the main feature of an OLTP application?()A Summarized queriesB Granular transactionsC Voluminous historical dataD Heterogeneous data sources

考题 单选题Which of the following is not a design feature of human language?()A ArbitrarinessB DisplacementC DualityD Meaningfulness

考题 单选题Which of the following is not a design feature of human language?A Arbitrariness.B Displacement.C Duality.D Diachronicity.