网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A new task facing biological security is to prevent _____ diseases and misuse of deadly agents.
A

ethnic

B

essential

C

epidemic

D

exterior


参考答案

参考解析
解析:
句意:生物安全面临的新任务是预防传染病和致命制剂的滥用。ethnic种族的。essential基本的,必要的。epidemic传染的。exterior外部的。
更多 “单选题A new task facing biological security is to prevent _____ diseases and misuse of deadly agents.A ethnicB essentialC epidemicD exterior” 相关考题
考题 A new law to prevent the export of ______ birds is to be introduced. A.scarceB.rareC.strangeD.specific

考题 The new logistics strategy requires the support of the relevant ( ),for computer provides brand new manners to process the traditional task. A、firewallB、logistic softwareC、ERPD、supply-chain

考题 The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?A.To prevent unauthorized hosts from getting access to the LANB.To limit the number of Layer 2 broadcasts on a particular switch portC.To prevent unauthorized Telnet or SSH access to a switch portD.To prevent the IP and MAC address of the switch and associated portsE.None of the above

考题 Which of the following utilities would a technician use to prevent a service from starting duringsystem startup?() A. Event ViewerB. System File CheckerC. MSCONFIGD. Task Manager

考题 Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?() A.IDSB.VPNC.NIPSD.HIDS

考题 The grid computing is a new(66)technology connecting the distributed and(67)resources to the high-speed network and integrating a super-computer of processing capacity. The significance and architecture of the grid computing is explained. Several kernel technology such as OGSI, resource management, task management, task scheduling, high rate communication and security are described. Aiming at the particularity of the grid computing environment a mechanism similar to the technology of the search engine is designed to registry, discovery and(68)the resources in the grid. The whole model of the resource management is built by connecting task manager in the local resource management system to others with P2P model. The task may migrate among the task managers in order to(69)the load. The task users summit may be executed in relatively tight resource set, which will not only decrease the total communication overheads of the whole task but also(70)the performance of the system.A.concentrativeB.distributedC.aggregateD.distributing

考题 When the delegates met at Philadelphia in 1787,their task was()Ato write a new constitutionBto see what they can do about the Articles of ConfederationCto design a new form of governmentDto revise the Articles of Confederation

考题 When the delegates met at Philadelphia in 1787,their task was()A、to write a new constitutionB、to see what they can do about the Articles of ConfederationC、to design a new form of governmentD、to revise the Articles of Confederation

考题 A customer wants to check whether they have the necessary tools enabled to prevent intrusions andvirus attacks on a Windows Vista workstation. Which of the following tools can be used to display thecurrent configuration? ()A、Security CenterB、Event Viewer Security logC、Windows DefenderD、Windows Firewall

考题 You work as the exchange administrator at TestKing.com. The TestKing.com network contains anExchange Server 2010 Organization. A new TestKing.com security policy requires that smart cardauthentication be used for all connections to Outlook Web App (OWA). During the course of day you receive an instruction form the CIO to recommend a solution to management that will comply with the new security policy. What should you do?()A、You should recommend that an Edge Transport server be deployed.Thereafter Windows Integrated authentication should be disabled.B、You should recommend that a certificate-based authentication be required for all Internet-facing Client access servers.C、You should recommend that a server that is configured to run Microosft Internet Security and acceleration (ISA)Server be deployed.Thereafter Kerberos contrained delegation should be enabled.D、You should recommend that Windows Integrated Authentication be compulsary for all Internet-facing client Access servers.

考题 You want to enhance the security within the LAN and prevent VLAN hopping.  What two steps can be taken to help prevent this?()A、Enable BPD guardB、Disable CDP on ports where it is not necessaryC、Place unused ports in a common unrouted VLAND、Prevent automatic trunk configurationE、Implement port security

考题 Which cisco security product line uses deep inspection to identify and prevent malicious attacks,resource misuse, and unauthorized access?()A、MARSB、NACC、VPND、IPS

考题 Which of the following utilities would a technician use to prevent a service from starting duringsystem startup?()A、Event ViewerB、System File CheckerC、MSCONFIGD、Task Manager

考题 Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A、IDSB、VPNC、NIPSD、HIDS

考题 Which file contains the attributes used to setup a new user account when executing ‘mkuser’ without any flags?()A、/etc/security/userB、/etc/security/passwdC、/etc/security/mkuser.sysD、/etc/security/mkuser.default

考题 For security reasons, an administrator is asked to modify the system to prevent someone from leaving a terminal logged in. To enable a five minute timeout for all users, what would need to be done to accomplish this task?()A、Add the following line to /etc/environment:  TMOUT=300B、Add the following lines to /.profile  TMOUT=5  export TMOUTC、Execute the following command:  chuser -u ALL -a TIMEOUT=5MD、Execute the following command:  chsec -u ALL -a TIMEOUT=600

考题 You are the administrator of a SQL Server 2005 computer named SQL1. You create a security template that disables unnecessary services. The template is appropriate only for SQL1. You need to ensure that the security template is applied to SQL1. Your solution must ensure that the template automatically overrides any manual configuration changes made by other administrators within an hour. What should you do?()A、Use the SQL Server Surface Area Configuration tool to import the security template.B、Use the Local Security Policy editor to import the security template into the Local Security Policy object.C、Configure Task Scheduler to import the security template by using Secedit.exe. Configure the task to run every half hour.D、Configure Task Scheduler to run the Microsoft Baseline Security Analyzer tool every half hour.

考题 You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()A、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPOB、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPOC、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPOD、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO

考题 You have an Exchange 2010 organization.  Your companys security policy states that all connections to Outlook Web App (OWA) must use smartcard authentication.  You need to recommend a solution to meet the security policy requirements.  Which two possible ways to achieve this goal should you recommend?()A、Require certificate-based authentication for all Internet-facing Client Access servers.B、Require Windows Integrated Authentication for all Internet-facing Client Access servers.C、Deploy an Edge Transport server, and then disable Windows Integrated Authentication.D、Deploy a server that runs Microsoft Internet Security and Acceleration (ISA) Server,and then  enableKerberos constrained delegation.

考题 You are the network administrator in the New York office of TestKing. The company network consists of a single Active Directory domain The New York office currently contains one Windows Server 2003 file server named TestKingA. All file servers in the New York office are in an organizational unit (OU) named New York Servers. You have been assigned the Allow - Change permission for a Group Policy object (GPO) named NYServersGPO, which is linked to the New York Servers OU. The written company security policy states that all new servers must be configured with specified predefined security settings when the servers join the domain. These settings differ slightly for the various company offices. You plan to install Windows Sever 2003, on 15 new computers, which all functions as file servers. You will need to configure the specified security settings on the new file servers. TestKingA currently has the specified security settings configured in its local security policy. You need to ensure that the security configuration of the new file servers is identical to that of TestKingA. You export a copy of TestKingA's local security policy settings to a template file. You need to configure the security settings of the new servers, and you want to use the minimum amount of administrative effort. What should you do?()A、Use the Security Configuration and Analysis tool on one of the new servers to import the template file.B、Use the default Domain Security Policy console on one of the new servers to import the template file.C、Use the Group Policy Editor console to open NYServersGPO and import the template file.D、Use the default Local Security Policy console on one of the new servers to import the template file.

考题 单选题Advances in biological knowledge have __________.A kept pace with those in physicsB been responsible for the invention of new machinesC surpassed those in physicsD lagged behind those in physics

考题 单选题A new task facing biological security is to prevent _____ diseases and misuse of deadly agents.A ethnicB essentialC epidemicD exterior

考题 多选题What are three benefits of the Cisco Adaptive Threat Defense strategy? (Choose three.) ()Ausing QoS techniques such as Traffic Policing to rate limit suspected traffic to prevent DoS attacksBautomatic reconfiguration s of the security devices based on current security threatsCcontainment and control of security threatsDapplication securityEanti-x defense F- virtual firewall

考题 单选题Which file contains the attributes used to setup a new user account when executing ’mkuser’ without any flags?()A /etc/security/userB /etc/security/passwdC /etc/security/mkuser.sysD /etc/security/mkuser.default

考题 单选题In order to strengthen maritime security and prevent and suppress acts of terrorism against shipping, a new, comprehensive security regime for international shipping was set to enter into force in July 2004 The new regime is().A ISM CodeB ISPS CodeC FSS CodeD IBC Code

考题 单选题You are the desktop administrator for one of your company's branch offices. The network in your branch office contains 100 Windows XP Professional computers. The computers are configured with the Compatws.inf security template. One of the network administrators in the company's main office creates a new security template named CompanySec.inf. The new template is designed to be applied to each of the company's Windows XP Professional computers. The users in your branch office have different security requirements from the users in the main office. You need to find out whether the new security template will violate the security requirements of the users in the branch office. What should you do?()A Run the Secedit.exe command in validation mode and specify the new security template.B Run the Secedit.exe command in configuration mode and specify the new security template. C Use the Security Configuration and Analysis console to import both templates into a security database, and then perform an Analyze operation. D Use the Security Configuration and Analysis console to import both templates into a security database, and then perform a Configure operation. 

考题 多选题You want to enhance the security within the LAN and prevent VLAN hopping.  What two steps can be taken to help prevent this?()AEnable BPD guardBDisable CDP on ports where it is not necessaryCPlace unused ports in a common unrouted VLANDPrevent automatic trunk configurationEImplement port security

考题 单选题You need to configure Active Directory to implement the new password policy for the HR department. What should you do?()A Create a new child domain named hr.ad.margiestravel.com in the existing forest. Move the resources from the HR OU to this new domain. Add the appropriate security settings in the Default Domain Policy for this new domain.B Add the appropriate security settings to the current Default Domain Policy.C Add the appropriate security settings to the local security policy of SQL1.D Set the SQL server check_policy and check_expiration options to On when creating all user accounts.