网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

● One of the basic rules of computer security is to change your(73) regularly.

(73)

A. name

B. computer

C. password

D. device


参考答案

更多 “ ● One of the basic rules of computer security is to change your(73) regularly.(73)A. nameB. computerC. passwordD. device ” 相关考题
考题 ● CMOS SETUP utility allows you to change your system (73) by selecting a variety of options.(73)A. devicesB. softwareC. configurationD. size

考题 A Web (73) is one of many software applications that function as the interfacebetween a user and the Internet.(73)A. displayB. browserC. windowD. view

考题 ● Project manager believes that modifying the project scope may provide added value for the customer. The project manager should (73) .(73) A. change the scope baselineB. contact the customer to determine if the change adds valueC. call a meeting of the change control boardD. change the project' s objectives

考题 ● A project life cycle is a collection of generally sequential project (73)whose name and number are determined by the control needs of the organization or organizations involved in the project. The life cycle provides the basic (74)for managing the project, regardless of the specific work involved.(73)A. phasesB. processesC. segmentsD. pieces(74)A. planB. fractionC. mainD. framework

考题 ● A Web ___(73)___ is one of many software applications that function as the interfacebetween a user and the Internet.(73)A. display B. browser C. window D. view

考题 A project life cycle is a collection of generally sequential project (73) whose name and number are determined by the control needs of the organization or organizations involved in the project. The life cycle provides the basic (74) for managing the project, regardless of the specific work involved.A.phasesB.processesC.segmentsD.pieces

考题 ● The program and the data are kept inside the computer in a place called(73) .(73)A. busB. cacheC. CPUD. memory

考题 ● (73) is the first line of protect between your computer and the public Internet.(73)A. The Internet protocolB. The firewallC. The anti-virus softwareD. The intrusion-detection systems

考题 ● One of the basic rules of computer security is to change your (73) regularly.(73)A. nameB. computerC. deviceD. password

考题 ● To document your code can increase program (72) and make program easier to (73).(72)A. reliabilityB. securityC. readabilityD. usability(73)A. executeB. interpretC. compileD. maintain

考题 Your network contains a computer named Computer1 that runs Windows 7.You need to verify if Computer1 has active DirectAccess connections to the network.What should you do?() A. From Network Connections, right-click the active network connection, and then click Status.B. From Network Connections, select the active network connection, and then click Diagnose this connection.C. From Windows Firewall with Advanced Security, click Monitoring, and then click Connection Security Rules.D. From Windows Firewall with Advanced Security, click Monitoring, click Security Associations, and then click Main Mode.

考题 Password is a(n)(71)series of characters that enables a user(72)a file, computer or program. On multi - user systems,(73)user must enter his or her password(74)the computer will respond to commands. The password helps ensure that unauthorized users do not access the computer. In addition, data files and programs may require a password.Ideally, the password should be something(75)could guess. In practice, most people choose a password that is easy to remember, such as their name or their initials. This is one reason it is relatively easy to break into most computer system.A.obviousB.secretC.importantD.easy

考题 One solution to major security problems is(73),which are frequently installed to fix known security holes.A.patchesB.compensationsC.complementsD.additions

考题 One of the basic rules of computer security is to change your ______ regularly.A.nameB.computerC.deviceD.PasswordA.B.C.D.

考题 ● __(73)__ are the four major activities of software configuration management.①configuration identification ②statement report ③change control④preparation of requirement document ⑤configuration auditing(73)A.①②③④ B.①②④⑤ C.①②③⑤ D.②③④⑤

考题 One of the basic rules of computer security is to change your(73)regularly.A.nameB.computerC.deviceD.password

考题 One of the basic roles of computer security is to change your((73))regularly.A.nameB.computerC.passwordD.device

考题 Conventionally,a computer consists of at1.ast one processing element, typically a(73) and some form of memory.A.deviceB.CPUC.controllerD.network

考题 ●A (73) is a named memory block. By using its name, we can refer to the data stored in the memory block.(73)A.wordB.recordC.programD.variable

考题 ● (73) manages the other components of a computer system.(73)A.BusB.Application systemC.Operating systemD.Disk

考题 ● The most important program on any computer is (73) .(73)A. Office 2000B. VirusC. softwareD. Operating System

考题 You are the administrator of 10 Windows XP Professional computers for your company. The computers are members of a Windows 2000 domain. Because the computers are used in a public area in the cafeteria, you audit all security events on the computers. A user named Marc reports that he was using one of the Windows XP Professional computers when the computer suddenly shut down with a STOP error. When the computer restarted, Marc attempted to log on by using the same user name and password that he used before. Marc received the following error message: "Your account is configured to prevent you from using this computer. Please try another computer." Marc states that he did not do anything to cause the STOP error to occur. You want to ensure that Marc can use this computer. What should you do?() A、On the computer, save and clear the security log, set the CrashOnAuditFail setting to 1, and restart the computer. B、On the computer, modify the local audit policy so that system events are not audited, set the CrashOnCtrlScroll setting to 1, and restart the computer. C、In the domain, modify Marc's Logon Workstations list to include the name of the computer.D、In the domain, modify Marc's account properties to unlock the account. 

考题 Your network contains a computer named Computer1 that runs Windows 7.You need to verify if Computer1 has active DirectAccess connections to the network.What should you do?()A、From Network Connections, right-click the active network connection, and then click Status.B、From Network Connections, select the active network connection, and then click Diagnose this connection.C、From Windows Firewall with Advanced Security, click Monitoring, and then click Connection Security Rules.D、From Windows Firewall with Advanced Security, click Monitoring, click Security Associations, and then click Main Mode.

考题 You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()A、Use secedit.exe to refresh the security policy.B、Use the local computer policy to configure the local security policy.C、Use security configuration and analysis to support the security files as a .pol file.D、Use computer management to configure the security policy setting.

考题 问答题Practice 3  Your TV set broke down only one week after it was brought. Write a letter of complaint to the store where your TV set was bought.  1) to express what is wrong with your TV set  2) to make your request (change for a new one, or return the broken one... )  3) to urge the store to give an early reply  You should write approximately 100 words. Do not sign your own name at the end of your letter. Use “Wang Lin” instead. You do not need to write your address and the date.

考题 单选题You are the network administrator for ExamSheet.net.  You have implemented the Hisecws.inf security template on all the Windows 2000 Professional computers in your network by using a GPO. A user has received a driver and utility software for the internal SCSI controller on his computer. The SCSI controller is not currently on the HCL. He uses the manufacturer provided CD to install the driver and the utility. He restarts the computer and reports that the internal SCSI controller is not working correctly.  You want to allow all users to install this driver on their client computers. You want to accomplish this task with the least amount of administrative effort. What should you do?()A Modify the GPO to change the Driver Signing option. B Run theSigverifcommand on each client computer.C Reconfigure the Driver Signing option on each client computer. Install the driver on each client     computer. Reapply the security template settings on each client computer.D Modify the Hisecws.inf security template on each client computer to change the Driver Signing     option.E Modify the Hisecws.inf security template on the domain controller to change the Driver Signing     option.

考题 单选题You have two computers named Computer1 and Computer2 that run Windows 7. You need to ensure thatComputer2 has exactly the same firewall rules as Computer1.  What should you do on Computer1?()A Run Winrm.exe quickconfig.B From Windows Firewall with Advanced Security, select Export Policy.C From Windows Firewall with Advanced Security, click Inbound Rules and then click Export List.D Open Local Security Policy. Right-click IP Security Policies on Local Computer and then click Export List.

考题 单选题You are attempting to connect to your ISP. You view the status change from Dialing to Verifying user name and password. After several seconds, the status changes to Disconnecting. You are then disconnected from the computer you dialed. You verify that your user name and password are entered correctly. You want to enable your Computer to connect to your ISP correctly. What should you do? ()A Configure your connection to enable data encryption.B Configure your connection to use the UNIX SLIP server.C Configure your connection to allow unsecured passwords.D Instruct your ISP to configure your account to support Multilink.