网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
In discretionary access environments, which of the following entities is authorized to grant information access to other people?在自主访问环境下,下列哪个实体有权授予其他人信息访问权限?()
A

Data Owner数据的所有者

B

Manager经理人员

C

Security Manager安全经理

D

Group Leader小组领导


参考答案

参考解析
解析: 暂无解析
更多 “单选题In discretionary access environments, which of the following entities is authorized to grant information access to other people?在自主访问环境下,下列哪个实体有权授予其他人信息访问权限?()A Data Owner数据的所有者B Manager经理人员C Security Manager安全经理D Group Leader小组领导” 相关考题
考题 在自主访问环境中,以下哪个实体可以将信息访问权授予给其他人?A、经理B、集团负责人C、安全经理D、数据所有者

考题 The meaning of ()is that access to protected information must be restricted to people who are authorized to access the information. A.digital signatureB.encryption technologyC.access controlD.authentication technology

考题 What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?() A. The ability to detect and prevent malicious traffic.B. The ability to associate security breaches with a specific user.C. Converged management of network and security events, network flow data, and identity information.D. Consistent device management across administrative realms.

考题 The meaningof( )is that access to protected information ust be restricted to people who are authorized to access the information.A.digital signature B.encryption technology C.access control D.authentication technology

考题 After creating backups of critical system and user data, which of the following is the BEST location to store the backups?()A、In the supply closet so anyone can access them if neededB、Near the server for easy access to restore filesC、Locked in a cabinet in the IT Manager’s officeD、At a secure off-site storage facility

考题 In discretionary access environments, which of the following entities is authorized to grant information access to other people?在自主访问环境下,下列哪个实体有权授予其他人信息访问权限?()A、Data Owner数据的所有者B、Manager经理人员C、Security Manager安全经理D、Group Leader小组领导

考题 Who should measure the effectiveness of Information System security related controls in an organization?在一个组织内,谁应该衡量信息系统安全相关控制的有效性?()A、The local security specialist本地安全专家B、The systems auditor系统审计师C、The central security manager中心安全经理D、The business manager业务经理

考题 Which of the following are necessary components of a Multi-Level Security Policy?下列哪一项是多级安全策略必需的组件?()A、Sensitivity Labels for subjects objects and a "system high" evaluation.对主体和客体实施敏感性标识以及对其进行系统高的评价B、Security Clearances for subjects Security Labels for objects and Mandatory Access Control.对主体和客体安全标识的安全许可以及强制访问控制C、Sensitivity Labels for only objects and Mandatory Access Control.只针对客体的敏感性标识和强制访问控制D、Sensitivity Labels for subjects objects and Discretionary Access Control.对主体及客体的敏感性表情和自主访问控制

考题 Which of the following are necessary components of a Multi-Level Security Policy? 下面哪项是多级安全策略的必要组成部分吗?()A、Sensitivity Labels for only objects and Mandatory Access Control.适合于唯一客体的敏感标记和强制访问控制。B、Sensitivity Labels for subjectsobjects anda"system high"evaluation.适合于主体与客体的敏感标记以及“高级别系统”评价。C、Security Clearances for subjectsSecurity Labels for objects and Mandatory Access Control.主体安全声明适合于唯一客体的敏感标记和强制访问控制。D、Sensitivity Labels for subjectsobjects and Discretionary Access Control.适合于主体与客体的敏感标记和自主访问控制。

考题 由数据所有者授予其他用户对数据的访问权限的访问控制方式是()。A、强制访问控制MACB、自主访问控制DACC、非自主访问控制NDACD、基于角色的访问控制RBAC

考题 Which of the following would be the correct location to access when enabling Driver Signature Verification?()A、On the hardware tab in System Properties.B、In the Security Center applet in Control Panel.C、In Device Manager under the File menu and options.D、In Computer Management.

考题 在自主访问控制中,主体有权对自身创建的客体(文件、数据表等访问对象)进行访问,并可将对这些客体的访问权限授予其他用户,还可收回授予其他用户的访问权限。

考题 一个部门经理有访问下属员工薪水的权限,但不能访问其他部门人员的薪水数据,实现这种的安全策略的数据安全机制实现的是下面哪种机制:()A、基于内容的访问控制(Content-dependent access control)B、基于属主的访问控制(Ownership-based access control)C、最小权限访问控制(Leastprivileges access control)D、基于内容上下文的访问控制(Context-dependent access control)

考题 Operation security requires the implementation of physical security to con-trol which of the following? 操作安全要求对下列哪项实施物理安全控制?()A、evacuation procedures 撤离步骤B、incoming hardware 硬件搬入C、contingency conditions 应急条件D、unauthorized personnel access 未经授权的人员访问

考题 A technician works in a datacenter that is shared by multiple companies. The technician isconcerned with preventing the theft of proprietary information by other technicians with access to the datacenter. Which of the following is the BEST way to prevent data theft in this scenario?()A、MantrapsB、Two-factor authenticationC、Security personnelD、Locked rack doors

考题 What information does the Junos Pulse Access Control Service provide to Security Threat Response Manager (STRM)?()A、Session lengthB、User browser informationC、Session IP addressD、User identity information

考题 You want to create a consumer group, GROUP1, and you execute the following command in the command-line interface:  SQL EXEC DBMS_RESOURCE_MANAGER.CREATE_CONSUMER_GROUP (CONSUMER_GROUP =’group1’, COMMENT = ’New Group’);  This command errorsout displaying the following message:  ERROR at line 1:  ORA-01031: insufficient privileges  ORA-06512: at "SYS.DBMS_RMIN", line 115  ORA-06512: at SYS.DBMS_RESOURCE_MANAGER", line 108 ORA-06512: at line 1  What action would you take to overcome this error?()A、 grant SYSDBA to the userB、 grant SYSOPER to the userC、 grant the RESOURCE role to the userD、 use the GRANT command to grant the ADMINISTER_RESOURCE_MANAGER privilege to the useE、 grant the ADMINISTER_RESOURCE_MANAGER privilege to the user by using the DBMS_RESOURCE_MANAGER_PRIVS package

考题 Kevin, the Software Developer of Perfect Solution Inc., recently left his job. The company's Administrator moves all of his home folder files to his Manager's home folder. The NTFS partition that contains the home folders has the Encrypting File System (EFS) enabled. When the Manager attempts to open Kevin's files, he is denied access.   What should be done, so that the Manager can access those files with least administrative burden? ()A、Grant the Manager NTFS Full Control permission to the files.B、Grant the Manager the NTFS Take Ownership permission to the files.C、Logon to the network as a Recovery Agent. Decrypt the files for the Manager.D、Logon to the network as a member of Backup Operators group. Decrypt the files for the Manager.

考题 单选题由数据所有者授予其他用户对数据的访问权限的访问控制方式是()。A 强制访问控制MACB 自主访问控制DACC 非自主访问控制NDACD 基于角色的访问控制RBAC

考题 单选题Which of the following are necessary components of a Multi-Level Security Policy?下列哪一项是多级安全策略必需的组件?()A Sensitivity Labels for subjects objects and a system high evaluation.对主体和客体实施敏感性标识以及对其进行系统高的评价B Security Clearances for subjects Security Labels for objects and Mandatory Access Control.对主体和客体安全标识的安全许可以及强制访问控制C Sensitivity Labels for only objects and Mandatory Access Control.只针对客体的敏感性标识和强制访问控制D Sensitivity Labels for subjects objects and Discretionary Access Control.对主体及客体的敏感性表情和自主访问控制

考题 单选题Which of the following are necessary components of a Multi-Level Security Policy? 下面哪项是多级安全策略的必要组成部分吗?()A Sensitivity Labels for only objects and Mandatory Access Control.适合于唯一客体的敏感标记和强制访问控制。B Sensitivity Labels for subjectsobjects andasystem highevaluation.适合于主体与客体的敏感标记以及“高级别系统”评价。C Security Clearances for subjectsSecurity Labels for objects and Mandatory Access Control.主体安全声明适合于唯一客体的敏感标记和强制访问控制。D Sensitivity Labels for subjectsobjects and Discretionary Access Control.适合于主体与客体的敏感标记和自主访问控制。

考题 单选题After creating backups of critical system and user data, which of the following is the BEST location to store the backups?()A In the supply closet so anyone can access them if neededB Near the server for easy access to restore filesC Locked in a cabinet in the IT Manager’s officeD At a secure off-site storage facility

考题 单选题在自主访问环境中,以下哪个实体可以将信息访问权授予给其他人?()A 经理B 集团负责人C 安全经理D 数据所有者

考题 单选题Operation security requires the implementation of physical security to con-trol which of the following? 操作安全要求对下列哪项实施物理安全控制?()A evacuation procedures 撤离步骤B incoming hardware 硬件搬入C contingency conditions 应急条件D unauthorized personnel access 未经授权的人员访问

考题 单选题Who should measure the effectiveness of Information System security related controls in an organization?在一个组织内,谁应该衡量信息系统安全相关控制的有效性?()A The local security specialist本地安全专家B The systems auditor系统审计师C The central security manager中心安全经理D The business manager业务经理

考题 单选题You want to create a consumer group, GROUP1, and you execute the following command in the command-line interface:  SQL EXEC DBMS_RESOURCE_MANAGER.CREATE_CONSUMER_GROUP (CONSUMER_GROUP =’group1’, COMMENT = ’New Group’);  This command errorsout displaying the following message:  ERROR at line 1:  ORA-01031: insufficient privileges  ORA-06512: at "SYS.DBMS_RMIN", line 115  ORA-06512: at SYS.DBMS_RESOURCE_MANAGER", line 108 ORA-06512: at line 1  What action would you take to overcome this error?()A  grant SYSDBA to the userB  grant SYSOPER to the userC  grant the RESOURCE role to the userD  use the GRANT command to grant the ADMINISTER_RESOURCE_MANAGER privilege to the useE  grant the ADMINISTER_RESOURCE_MANAGER privilege to the user by using the DBMS_RESOURCE_MANAGER_PRIVS package

考题 单选题一个部门经理有访问下属员工薪水的权限,但不能访问其他部门人员的薪水数据,实现这种的安全策略的数据安全机制实现的是下面哪种机制:()A 基于内容的访问控制(Content-dependent access control)B 基于属主的访问控制(Ownership-based access control)C 最小权限访问控制(Leastprivileges access control)D 基于内容上下文的访问控制(Context-dependent access control)