网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
In discretionary access environments, which of the following entities is authorized to grant information access to other people?在自主访问环境下,下列哪个实体有权授予其他人信息访问权限?()
A
Data Owner数据的所有者
B
Manager经理人员
C
Security Manager安全经理
D
Group Leader小组领导
参考答案
参考解析
解析:
暂无解析
更多 “单选题In discretionary access environments, which of the following entities is authorized to grant information access to other people?在自主访问环境下,下列哪个实体有权授予其他人信息访问权限?()A Data Owner数据的所有者B Manager经理人员C Security Manager安全经理D Group Leader小组领导” 相关考题
考题
The meaning of ()is that access to protected information must be restricted to people who are authorized to access the information.
A.digital signatureB.encryption technologyC.access controlD.authentication technology
考题
What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()
A. The ability to detect and prevent malicious traffic.B. The ability to associate security breaches with a specific user.C. Converged management of network and security events, network flow data, and identity information.D. Consistent device management across administrative realms.
考题
The meaningof( )is that access to protected information ust be restricted to people who are authorized to access the information.A.digital signature
B.encryption technology
C.access control
D.authentication technology
考题
After creating backups of critical system and user data, which of the following is the BEST location to store the backups?()A、In the supply closet so anyone can access them if neededB、Near the server for easy access to restore filesC、Locked in a cabinet in the IT Manager’s officeD、At a secure off-site storage facility
考题
In discretionary access environments, which of the following entities is authorized to grant information access to other people?在自主访问环境下,下列哪个实体有权授予其他人信息访问权限?()A、Data Owner数据的所有者B、Manager经理人员C、Security Manager安全经理D、Group Leader小组领导
考题
Who should measure the effectiveness of Information System security related controls in an organization?在一个组织内,谁应该衡量信息系统安全相关控制的有效性?()A、The local security specialist本地安全专家B、The systems auditor系统审计师C、The central security manager中心安全经理D、The business manager业务经理
考题
Which of the following are necessary components of a Multi-Level Security Policy?下列哪一项是多级安全策略必需的组件?()A、Sensitivity Labels for subjects objects and a "system high" evaluation.对主体和客体实施敏感性标识以及对其进行系统高的评价B、Security Clearances for subjects Security Labels for objects and Mandatory Access Control.对主体和客体安全标识的安全许可以及强制访问控制C、Sensitivity Labels for only objects and Mandatory Access Control.只针对客体的敏感性标识和强制访问控制D、Sensitivity Labels for subjects objects and Discretionary Access Control.对主体及客体的敏感性表情和自主访问控制
考题
Which of the following are necessary components of a Multi-Level Security Policy? 下面哪项是多级安全策略的必要组成部分吗?()A、Sensitivity Labels for only objects and Mandatory Access Control.适合于唯一客体的敏感标记和强制访问控制。B、Sensitivity Labels for subjectsobjects anda"system high"evaluation.适合于主体与客体的敏感标记以及“高级别系统”评价。C、Security Clearances for subjectsSecurity Labels for objects and Mandatory Access Control.主体安全声明适合于唯一客体的敏感标记和强制访问控制。D、Sensitivity Labels for subjectsobjects and Discretionary Access Control.适合于主体与客体的敏感标记和自主访问控制。
考题
Which of the following would be the correct location to access when enabling Driver Signature Verification?()A、On the hardware tab in System Properties.B、In the Security Center applet in Control Panel.C、In Device Manager under the File menu and options.D、In Computer Management.
考题
一个部门经理有访问下属员工薪水的权限,但不能访问其他部门人员的薪水数据,实现这种的安全策略的数据安全机制实现的是下面哪种机制:()A、基于内容的访问控制(Content-dependent access control)B、基于属主的访问控制(Ownership-based access control)C、最小权限访问控制(Leastprivileges access control)D、基于内容上下文的访问控制(Context-dependent access control)
考题
Operation security requires the implementation of physical security to con-trol which of the following? 操作安全要求对下列哪项实施物理安全控制?()A、evacuation procedures 撤离步骤B、incoming hardware 硬件搬入C、contingency conditions 应急条件D、unauthorized personnel access 未经授权的人员访问
考题
A technician works in a datacenter that is shared by multiple companies. The technician isconcerned with preventing the theft of proprietary information by other technicians with access to the datacenter. Which of the following is the BEST way to prevent data theft in this scenario?()A、MantrapsB、Two-factor authenticationC、Security personnelD、Locked rack doors
考题
What information does the Junos Pulse Access Control Service provide to Security Threat Response Manager (STRM)?()A、Session lengthB、User browser informationC、Session IP addressD、User identity information
考题
You want to create a consumer group, GROUP1, and you execute the following command in the command-line interface: SQL EXEC DBMS_RESOURCE_MANAGER.CREATE_CONSUMER_GROUP (CONSUMER_GROUP =’group1’, COMMENT = ’New Group’); This command errorsout displaying the following message: ERROR at line 1: ORA-01031: insufficient privileges ORA-06512: at "SYS.DBMS_RMIN", line 115 ORA-06512: at SYS.DBMS_RESOURCE_MANAGER", line 108 ORA-06512: at line 1 What action would you take to overcome this error?()A、 grant SYSDBA to the userB、 grant SYSOPER to the userC、 grant the RESOURCE role to the userD、 use the GRANT command to grant the ADMINISTER_RESOURCE_MANAGER privilege to the useE、 grant the ADMINISTER_RESOURCE_MANAGER privilege to the user by using the DBMS_RESOURCE_MANAGER_PRIVS package
考题
Kevin, the Software Developer of Perfect Solution Inc., recently left his job. The company's Administrator moves all of his home folder files to his Manager's home folder. The NTFS partition that contains the home folders has the Encrypting File System (EFS) enabled. When the Manager attempts to open Kevin's files, he is denied access. What should be done, so that the Manager can access those files with least administrative burden? ()A、Grant the Manager NTFS Full Control permission to the files.B、Grant the Manager the NTFS Take Ownership permission to the files.C、Logon to the network as a Recovery Agent. Decrypt the files for the Manager.D、Logon to the network as a member of Backup Operators group. Decrypt the files for the Manager.
考题
单选题Which of the following are necessary components of a Multi-Level Security Policy?下列哪一项是多级安全策略必需的组件?()A
Sensitivity Labels for subjects objects and a system high evaluation.对主体和客体实施敏感性标识以及对其进行系统高的评价B
Security Clearances for subjects Security Labels for objects and Mandatory Access Control.对主体和客体安全标识的安全许可以及强制访问控制C
Sensitivity Labels for only objects and Mandatory Access Control.只针对客体的敏感性标识和强制访问控制D
Sensitivity Labels for subjects objects and Discretionary Access Control.对主体及客体的敏感性表情和自主访问控制
考题
单选题Which of the following are necessary components of a Multi-Level Security Policy? 下面哪项是多级安全策略的必要组成部分吗?()A
Sensitivity Labels for only objects and Mandatory Access Control.适合于唯一客体的敏感标记和强制访问控制。B
Sensitivity Labels for subjectsobjects andasystem highevaluation.适合于主体与客体的敏感标记以及“高级别系统”评价。C
Security Clearances for subjectsSecurity Labels for objects and Mandatory Access Control.主体安全声明适合于唯一客体的敏感标记和强制访问控制。D
Sensitivity Labels for subjectsobjects and Discretionary Access Control.适合于主体与客体的敏感标记和自主访问控制。
考题
单选题After creating backups of critical system and user data, which of the following is the BEST location to store the backups?()A
In the supply closet so anyone can access them if neededB
Near the server for easy access to restore filesC
Locked in a cabinet in the IT Manager’s officeD
At a secure off-site storage facility
考题
单选题Operation security requires the implementation of physical security to con-trol which of the following? 操作安全要求对下列哪项实施物理安全控制?()A
evacuation procedures 撤离步骤B
incoming hardware 硬件搬入C
contingency conditions 应急条件D
unauthorized personnel access 未经授权的人员访问
考题
单选题Who should measure the effectiveness of Information System security related controls in an organization?在一个组织内,谁应该衡量信息系统安全相关控制的有效性?()A
The local security specialist本地安全专家B
The systems auditor系统审计师C
The central security manager中心安全经理D
The business manager业务经理
考题
单选题You want to create a consumer group, GROUP1, and you execute the following command in the command-line interface: SQL EXEC DBMS_RESOURCE_MANAGER.CREATE_CONSUMER_GROUP (CONSUMER_GROUP =’group1’, COMMENT = ’New Group’); This command errorsout displaying the following message: ERROR at line 1: ORA-01031: insufficient privileges ORA-06512: at "SYS.DBMS_RMIN", line 115 ORA-06512: at SYS.DBMS_RESOURCE_MANAGER", line 108 ORA-06512: at line 1 What action would you take to overcome this error?()A
grant SYSDBA to the userB
grant SYSOPER to the userC
grant the RESOURCE role to the userD
use the GRANT command to grant the ADMINISTER_RESOURCE_MANAGER privilege to the useE
grant the ADMINISTER_RESOURCE_MANAGER privilege to the user by using the DBMS_RESOURCE_MANAGER_PRIVS package
考题
单选题一个部门经理有访问下属员工薪水的权限,但不能访问其他部门人员的薪水数据,实现这种的安全策略的数据安全机制实现的是下面哪种机制:()A
基于内容的访问控制(Content-dependent access control)B
基于属主的访问控制(Ownership-based access control)C
最小权限访问控制(Leastprivileges access control)D
基于内容上下文的访问控制(Context-dependent access control)
热门标签
最新试卷