网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Operation security requires the implementation of physical security to con-trol which of the following? 操作安全要求对下列哪项实施物理安全控制?()

  • A、evacuation procedures 撤离步骤
  • B、incoming hardware 硬件搬入
  • C、contingency conditions 应急条件
  • D、unauthorized personnel access 未经授权的人员访问

参考答案

更多 “Operation security requires the implementation of physical security to con-trol which of the following? 操作安全要求对下列哪项实施物理安全控制?()A、evacuation procedures 撤离步骤B、incoming hardware 硬件搬入C、contingency conditions 应急条件D、unauthorized personnel access 未经授权的人员访问” 相关考题
考题 You are developing a Windows Communication Foundation (WCF) service. The service operation takes a customer number as the only argument and returns information about the customer. The service requires a security token in the header of the message. You need to create a message contract for the service.Which code segment should you use?()A.B.C.D.

考题 Observe the structure of the table employees:The table contains 8475 records.One of the employees wants to know the names of all employees of the company. For this, he fires the following query:SELECT * FROM EMPLOYEES ORDER BY emp_fname;Since the operation performed on executing the query cannot fit into memory, it requires disk space to complete the operation.Which of the following types of segments will Oracle allocate to complete the operation and to provide the required result?()A. Rollback segmentB. Temporary segmentC. Data segmentD. Index segment

考题 The operation of _______two alternators requires the voltages to be equal and also in phaseA.parallelingB.series-mountingC.runningD.controlling

考题 Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()A. Source IP and browserB. Source IP and certificateC. Certificate and Host CheckerD. Host Checker and source IP

考题 You have a computer that runs Windows Vista.You run ipconfig /release from the command prompt and receive the following error message: The requested operation requires elevation.”You need to release the IP address for the computer.What should you do?()A.AB.BC.CD.D

考题 ()is not included in the main contents of the operation and maintenance of the information system.A.Daily operation and maintenanceB.System changeC.Security managementD.Business change

考题 Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。 A.It specifies use of a static encryption key that must be changed frequently to enhance securityB.It requires use of an open authentication methodC.It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD.It requires that all access points and wireless devices use the same encryption keyE.It includes authentication by PSK

考题 I HEREBY ON BEHALF OF MY OWNERS DECLARE G.A. AND REQUIRE ALL PARTIES CONCERNED TO PROVIDE G.A. SECURITY ASAP.From this fax it is inferred that the vessel ______.A.has suffered some damage or lossB.requires her owners to provide some securityC.requires all parties to declare G.AD.concerned to provide G.A. to all parties

考题 What solution would you recommend to a small business customer that requires high-bandwidth connectivity and strong security?()A、 CE520B、 520-T1 SRC、 ASA5505D、 UC520

考题 A datacenter director implements a new security measure in response to multiple equipment thefts from the datacenter. The new security measure requires people entering or leaving the data center to go through an extra secure area. Once entering the area people must present two forms of authentication to leave. Which of the following security measures does this describe?()A、MantrapB、RFID cardsC、Defense in depthD、Biometrics

考题 What is true about the operation of the Infranet Enforcer? ()A、It assigns users a set of roles.B、It allows access based on auth table entries.C、It verifies whether an endpoint meets security requirements.D、It configures the UAC agent to allow or deny access to resources.

考题 You are developing a Windows Communication Foundation (WCF) service. One of the parameters used with the service operations is a security token. The security token is not sensitive. The monitoring software tracks security tokens and can read tokens in clear text only.The company security policy requires that you validate all clear text data passed over the corporate network.You need to ensure that the service verifies that the security token is not changed during transit. What should you do?()A、For all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to EncryptAndSign.B、Implement IEndpointldentityProvider in the message contract class.C、Implement ISecureConversationSession in the message contract class.D、For all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to Sign.

考题 Which statement describes the behavior of a security policy?()A、The implicit default security policy permits all traffic.B、Traffic destined to the device itself always requires a security policy.C、Traffic destined to the device’s incoming interface does not require a security policy.D、The factory-default configuration permits all traffic from all interfaces.

考题 Increased productivity, minimized legal risks, and improvements in "green" operation can be easily linked to Cisco solutions in which technology area?()A、routing and switchingB、web collaborationC、on the destination network, between the server and a routerD、eCommerceE、voiceF、security

考题 Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()A、It specifies use of a static encryption key that must be changed frequently to enhance security.B、It requires use of an open authentication method.C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection.D、It requires that all access points and wireless devices use the same encryption key.E、It includes authentication by PSK

考题 Which two statements best describe enhanced wireless security encryption?()A、TKIP protects RC4 encryption keysB、CKIP and TKIP protect AES encryption keysC、TKIP encryption is more processor intensive than AES encryption isD、WPA requires TKIP encryption, whereas WPA2 supports AES encryptionE、WPA requires AES encryption, whereas WPA2 supports TKIP encryption

考题 You are creating a Windows Communication Foundation (WCF) service based on WSHttpBinding. New audit requirements dictate that callers must be authenticated on every call to ensure that their credentials have not been revoked.You need to ensure that the service will not cache the security request token. What should you do?()A、Apply a ServiceBehavior attribute to the service implementation class with the lnstanceContextMode property set to Single.B、In the message security configuration, change clientCredentialType from lssuedToken to UserNameC、In the message security configuration, set establishSecurityContext to false.D、At the end of every operation, call the SessionStateUtility.RaiseSessionEnd method.

考题 多选题Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()AIt specifies use of a static encryption key that must be changed frequently to enhance security.BIt requires use of an open authentication method.CIt specifies the use of dynamic encryption keys that change each time a client establishes a connection.DIt requires that all access points and wireless devices use the same encryption key.EIt includes authentication by PSK

考题 单选题Proper operation of the main engine reduction gear set requires the operation to monitor ()A the sump oil levelB oil flow sight glassesC bearing temperaturesD all of the above

考题 单选题You are developing a Windows Communication Foundation (WCF) service. One of the parameters used with the service operations is a security token. The security token is not sensitive. The monitoring software tracks security tokens and can read tokens in clear text only.The company security policy requires that you validate all clear text data passed over the corporate network.You need to ensure that the service verifies that the security token is not changed during transit. What should you do?()A For all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to EncryptAndSign.B Implement IEndpointldentityProvider in the message contract class.C Implement ISecureConversationSession in the message contract class.D For all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to Sign.

考题 多选题Which operation requires that you create an auxiliary instance manually before executing the operation?()ABackup-based database duplication.BActive database duplication.CTablespace point-in-time recovery.DNo operation requires the creation of an auxiliary instance.

考题 单选题You are the desktop administrator for one of your company's branch offices. The network in your branch office contains 100 Windows XP Professional computers. The computers are configured with the Compatws.inf security template. One of the network administrators in the company's main office creates a new security template named CompanySec.inf. The new template is designed to be applied to each of the company's Windows XP Professional computers. The users in your branch office have different security requirements from the users in the main office. You need to find out whether the new security template will violate the security requirements of the users in the branch office. What should you do?()A Run the Secedit.exe command in validation mode and specify the new security template.B Run the Secedit.exe command in configuration mode and specify the new security template. C Use the Security Configuration and Analysis console to import both templates into a security database, and then perform an Analyze operation. D Use the Security Configuration and Analysis console to import both templates into a security database, and then perform a Configure operation. 

考题 单选题Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()A Source IP and browserB Source IP and certificateC Certificate and Host CheckerD Host Checker and source IP

考题 单选题What solution would you recommend to a small business customer that requires high-bandwidth connectivity and strong security?()A  CE520B  520-T1 SRC  ASA5505D  UC520

考题 单选题A corporation is not concerned about wireless use by Teleworkers. Authentication for any application first requires access via a web browser to a protected site. Given these requirements, choose the appropriate security feature to use to enforce the security policy.()A Authentication ProxyB 802.1X C Context-Based Access ControlD Intrusion Detection SystemE Stateful firewall

考题 单选题Which statement describes the behavior of a security policy?()A The implicit default security policy permits all traffic.B Traffic destined to the device itself always requires a security policy.C Traffic destined to the device’s incoming interface does not require a security policy.D The factory-default configuration permits all traffic from all interfaces.

考题 单选题The operation of paralleling two alternators requires the voltages to be ()and also in phase.A zeroB eliminatedC differentD equal