网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()
A

The cell phone should require a password after a set period of inactivity.

B

The cell phone should only be used for company related emails.

C

The cell phone data should be encrypted according to NIST standards.

D

The cell phone should have data connection abilities disabled.


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A The cell phone should require a password after a set period of inactivity.B The cell phone should only be used for company related emails.C The cell phone data should be encrypted according to NIST standards.D The cell phone should have data connection abilities disabled.” 相关考题
考题 Which of the following is the BEST approach a technician should take when informing a customerabout their findings of any specific computer problem?() A. Use non-technical terms.B. Use the appropriate acronyms.C. Use proper technical terms.D. Use email to ensure a written record.

考题 Which of the following is BEST for providing network security?() A.FirewallB.DMZC.SwitchD.IDS

考题 Which of the following are examples of physical security measures?() A. Policies and proceduresB. EncryptionC. Locked doorsD. Security personnelE. Backup tapes

考题 A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?() A. WEPB. Port filteringC. WPAD. Longer SSID broadcast intervals

考题 A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption

考题 Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?() A. Network layer firewallB. Stateful inspection firewallC. Zone aware firewallD. Application layer firewall

考题 Which one is the most important based on the following common elements of a network design?()A、Business needsB、Risk analysisC、Security policyD、Best practices

考题 Which of the following is best practice when disposing of used equipment?()A、Donating to a non-profit groupB、Use a local recycling companyC、Send equipment back to manufacturerD、Following local laws

考题 Which of the following is the BEST approach a technician should take when informing a customerabout their findings of any specific computer problem?()A、Use non-technical terms.B、Use the appropriate acronyms.C、Use proper technical terms.D、Use email to ensure a written record.

考题 Which of the following is BEST for providing network security?()A、FirewallB、DMZC、SwitchD、IDS

考题 A technician installed a new application on a Windows XP desktop. When the technician tries to launch the application it crashes. Which of the following can the technician use to troubleshoot the application?()A、System logsB、Security logsC、Application logsD、Application installation logs

考题 Which of the following provides the BEST security and accountability for a Data Center?()A、Entry loggingB、Combination locksC、Card keysD、Dead bolts

考题 Which of the following BEST describes the function of a DNS server?()A、Secures network traffic through shared key encryption.B、Provides resolution of host names to IP addresses.C、Provides security for a network through the use of ACLs.D、Dynamically assigns IP addresses for easy client configuration.

考题 Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A、The cell phone should require a password after a set period of inactivity.B、The cell phone should only be used for company related emails.C、The cell phone data should be encrypted according to NIST standards.D、The cell phone should have data connection abilities disabled.

考题 Which of the following would be the BEST device to use when removing a loose screw from theinside of a laptop?()A、Needle-nose pliersB、Extension magnetC、Locking pliersD、Loopback plug

考题 A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()A、WEPB、Port filteringC、WPAD、Longer SSID broadcast intervals

考题 Which of the following are examples of physical security measures?()A、Policies and proceduresB、EncryptionC、Locked doorsD、Security personnelE、Backup tapes

考题 Which of the following is the BEST to use when securing fiber cables and preventing damage?()A、Zip tiesB、Twist tiesC、Black electrical tapeD、Velcro cable straps

考题 A user’s OS has become corrupt, and the user would like to restore the PC back to when they first bought the machine. Which of the following would be the BEST choice?()A、Factory Recovery PartitionB、Use Safe ModeC、Last Known Good ConfigurationD、Purchase a copy of the original OS

考题 Which of the following tools would an administrator BEST use to trace a network cable?()A、TonerB、Cable testerC、Butt setD、Multimeter

考题 Your company uses Windows Update to download and install security updates on client computers. When Microsoft releases a security update, you have the following requirements:   Establish which client computers require the security update.   Identify what changes will occur as a result of the security update.  Identify which applications might be affected by the security update.    You need to select the appropriate tool to detect application-compatibility issues.   What should you do?()A、Use the Inventory Collector.B、Use the Setup Analysis Tool.C、Use the Update Compatibility Evaluator.D、Use the Windows Compatibility Evaluator.

考题 Which of the following ports is BEST to use when adding a network printer in Windows XP?()A、USBB、COM5C、LPT1D、TCP/IP

考题 单选题Which of the following provides the BEST security and accountability for a Data Center?()A  Entry loggingB  Combination locksC  Card keysD  Dead bolts

考题 单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A WEP encryptionB Channel rotationC Disable SSIDD WPA encryption

考题 单选题Which of the following ports is BEST to use when adding a network printer in Windows XP?()A USBB COM5C LPT1D TCP/IP

考题 单选题Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()A Network layer firewallB Stateful inspection firewallC Zone aware firewallD Application layer firewall

考题 单选题Which of the following statements is the best title for the passage?A Causes of Accelerating Language DisappearanceB The Future of LanguageC The Acceleration of Language DeathD Government Language Policies