网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following would be an example of a biometric device?()
A
USB security key
B
smart card reader
C
thumb print reader
D
encryption password
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following would be an example of a biometric device?()A USB security keyB smart card readerC thumb print readerD encryption password” 相关考题
考题
When configuring a POS system, which of the following peripheral devices would MOST likelyneed to be installed?()
A. Optical mouseB. Handheld digitizerC. Barcode readerD. TouchscreenE. Document scannerF. KeyboardG. External USB drive
考题
A customer, who brings their laptop to work on a daily basis, calls to ask for the best way to add USB ports and an additional network card to their laptop. Which of the following would meet the user’s requirements?()A. Docking stationB. Self powered USB hubC. KVM switchD. Non-powered USB hub
考题
When adding a FireWire adapter to a laptop, which of the following ports would MOST likely beused? ()
A. MMC portB. SODIMM slotC. Express card 34D. USB 1.1 port
考题
Which of the following is a multimedia device?()
A. Biometric deviceB. MouseC. CamcorderD. Infrared scanner
考题
Which of the following are types of biometric devices used in server rooms?()
A. MantrapsB. Fingerprint scannersC. CCTV systemsD. Retina scannerE. Proxy card readers
考题
Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examplesof which of the following security types?()A、PhysicalB、LogicalC、SoftwareD、Authentication
考题
When configuring a POS system, which of the following peripheral devices would MOST likelyneed to be installed?()A、Optical mouseB、Handheld digitizerC、Barcode readerD、TouchscreenE、Document scannerF、KeyboardG、External USB drive
考题
A new computer is displaying the wrong amount of memory. Which of the following may be the cause?()A、The module is installed backwards.B、A USB device is using some memory.C、An onboard video card is using some memory.D、The CPU is using some memory.
考题
A customer, who brings their laptop to work on a daily basis, calls to ask for the best way to add USB ports and an additional network card to their laptop. Which of the following would meet the user’s requirements?()A、Docking stationB、Self powered USB hubC、KVM switchD、Non-powered USB hub
考题
Which of the following is the MOST secure method to authenticate users?()A、User ID, a strong password, and a fingerprint scannerB、User ID, a strong password, and a token based deviceC、User ID and two levels of strong password requirementsD、User ID, a strong password, and a smart card
考题
When adding a FireWire adapter to a laptop, which of the following ports would MOST likely beused? ()A、MMC portB、SODIMM slotC、Express card 34D、USB 1.1 port
考题
Which of the following would be an example of a biometric device?()A、USB security keyB、smart card readerC、thumb print readerD、encryption password
考题
Which of the following is a multimedia device?()A、Biometric deviceB、MouseC、CamcorderD、Infrared scanner
考题
A KVM system may connect which of the following?()A、PS/2 mouseB、USB mouseC、SVGA displayD、NICE、USB memory stickF、HBA card
考题
Which of the following has to be installed on a laptop in order to use a compact flash storage device?()A、a multi-media card readerB、USB 2.0 driversC、USB 1.1 driversD、an enhanced 1.44 floppy drive
考题
Which of the following are types of biometric devices used in server rooms? ()A、 MantrapsB、 Fingerprint scannersC、 CCTV systemsD、 Retina scannerE、 Proxy card readers
考题
You are a help desk technician for your company. Susan is an executive. Because Susan travels frequently, she uses a Windows XP Professional portable computer that has a smart card reader. Susan asks you to configure her computer so that she can dial in to the company network when she is out of the office. Company security policy states that dial-in users must use a smart card when they connect to the network, and that the users must use the strongest form of data encryption possible. Company security policy also states that client computers must disconnect if the Routing and Remote Access server does not support both smart card authentication and the strongest possible authentication. You need to configure the dial-up connection properties on Susan’s computer to dial in to the company network. Your solution must ensure that company security policies are enforced. Which three actions should you perform?() A、Select the Advanced (custom settings) security option.B、Select the Require data encryption check box. C、Select the Typical (recommended settings) security option. D、Select the Use smart card item from the Validate my identity as follows list.E、Select the Maximum strength encryption item from the Data encryption list.F、Select the Extensible Authentication Protocol (EAP) option, and select Smart Card or other Certificate from the EAP list.
考题
You need to design a strategy to increase security for the client computers in the finance department. Which two actions should you perform?()A、Enable automatic certificate enrollmentB、Enforce smart card logonsC、Enable Encrypting File System (EFS) for offline filesD、Enable a screen saver password
考题
单选题Which of the following is the MOST secure method to authenticate users?()A
User ID, a strong password, and a fingerprint scannerB
User ID, a strong password, and a token based deviceC
User ID and two levels of strong password requirementsD
User ID, a strong password, and a smart card
考题
单选题Which of the following ensures the MOST secure access to a server room?()A
ID card readersB
Server rack doorsC
Biometric devicesD
Locked doors
考题
单选题A second network card in a server that activates if the primary card fails is an example of which of the following network performance optimization?()A
Load balancingB
QoSC
High availabilityD
Fault tolerance
考题
单选题A customer, who brings their laptop to work on a daily basis, calls to ask for the best way to add USB ports and an additional network card to their laptop. Which of the following would meet the user’s requirements?()A
Docking stationB
Self powered USB hubC
KVM switchD
Non-powered USB hub
考题
单选题A new computer is displaying the wrong amount of memory. Which of the following may be the cause?()A
The module is installed backwards.B
A USB device is using some memory.C
An onboard video card is using some memory.D
The CPU is using some memory.
考题
单选题Which of the following storage devices is not an example of an optical storage device?()A
Blu-RayB
DVDC
SSDD
CD
考题
单选题Examine the following RMAN command:RMAN CONFIGURE ENCRYPTION FOR DATABASE ON;RMAN BACKUP DATABASE PLUS ARCHIVELOG;Which prerequisite must be met before accomplishing the backup?()A
Provide a password for the encryptionB
Set up an Oracle wallet for the encryptionC
No setup is required as it is a default encryption methodD
Both Oracle wallet and password must be set up for the encryption
考题
多选题Which of the following are types of biometric devices used in server rooms? ()AMantrapsBFingerprint scannersCCCTV systemsDRetina scannerEProxy card readers
考题
单选题Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examplesof which of the following security types?()A
PhysicalB
LogicalC
SoftwareD
Authentication
热门标签
最新试卷