网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()
A

The cell phone should require a password after a set period of inactivity.

B

The cell phone should only be used for company related emails.

C

The cell phone data should be encrypted according to NIST standards.

D

The cell phone should have data connection abilities disabled.


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A The cell phone should require a password after a set period of inactivity.B The cell phone should only be used for company related emails.C The cell phone data should be encrypted according to NIST standards.D The cell phone should have data connection abilities disabled.” 相关考题
考题 Which of the following does Strayer want to stress most?A.The driving performance may be weakened by a cell phone talking.B.The driving performance may be affected by a high blood alcohol level.C.Drivers are not to drive over the cell phone or after drinking.D.A cell phone talking is no less hazardous than alcohol in driving.

考题 The experiment shows all the following EXCEPT that .A.the cell phone drivers get less than half of the visual informationB.the cell phone drivers are, twice as likely to hit the front carsC the cell phone driver’S response to sudden dangers is slowerD.the 110 drivers were reluctant to take part in the experiment

考题 According to the passage, which of the following statements is TRUE?() A.After the cell-phone ban is ended, students can use their phones during classB.The cell-phone ban is equally enforced in all public schoolsC.A phone-storage industry has appeared outside the 88 metal-detector campuses

考题 A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat() A. Incident responseB. Asset managementC. Patch managementD. Policies and procedures

考题 Which of the following is NOT a security feature relating to user accounts?()A、Some commands can be password protected requiring logged in customers to re-enter their password.B、A user account can be disabled automatically, after a specified number of invalid login attempts.C、An account can have multiple valid passwords at the same time, any of which can be used to access the account.D、The password policy feature can allow the system to require passwords to include a minimum number of numeric characters.E、Logged in customers can be logged off of the system after a specified period of inactivity.

考题 Which three actions are required to access the network statistics on a remote Cisco Unified Wireless IP Phone 7921G via a web browser?()A、Browse to the phone using the MAC address of the phone.B、Use HTTPS:// preceding the address of the phone.C、Change web access to read/write for the MAC address of the phone on Cisco Unified Communications Manager.D、Enter the username and password of the phone.E、Ensure that the host is on the same subnet as the remote phone.

考题 Which firewall best practices can help mitigate worm and other automated attacks?()A、Segment security zonesB、Restrict access to firewallsC、Use logs and alertsD、Set connection limits

考题 A user has forgotten their BIOS password on their computer. Which of the following would atechnician use to allow the user access to their PC?()A、Remove the BIOS chip on the PCB、Re-flash the BIOSC、Run password cracking software on the users PCD、Set the password clear jumper on the motherboard

考题 Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A、The cell phone should require a password after a set period of inactivity.B、The cell phone should only be used for company related emails.C、The cell phone data should be encrypted according to NIST standards.D、The cell phone should have data connection abilities disabled.

考题 A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat()A、Incident responseB、Asset managementC、Patch managementD、Policies and procedures

考题 A user reports that their cell phone battery is dead and cannot hold a charge. Which of the following should be done when disposing of the old battery?()A、Recycle the battery.B、Store the battery.C、Place battery in a sealed plastic bag.D、Disassemble the battery.

考题 A customer has a question about the repairs needed for their desktop computer. While asking their question to a technician, the technician receives a personal phone call on their cell phone. Which of the following should the technician do NEXT?()A、Ask the customer to wait and answer the phone call.B、Talk on the phone while listening to the customer.C、Hand the phone to a coworker to answer the call.D、Silence the phone and then listen to the customer.

考题 An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()A、The MAC can only be delivered to a mobile phone and is good for a single use only.B、The MAC can be delivered by mobile phone, e-mail, or fax, and it is good for one time authentication only.C、The MAC can only be delivered to a mobile phone and it is good until the expiration time is reached, as set by an administrator.D、The MAC can be delivered by mobile phone, email, or fax, and it is good until the expiration time is reached, as set by an administrator.

考题 Review the definition of the phone_list view. CHEATE OR REPLACE ALGORITHM=MERGE DEFINER= 'root'@localhost' SQL SECURITY DEFINER VIEW 'phone_list' AS SELECT e . id as id 'e . first_name AS 'first_name' 'e . last_name AS 'last_name' 'coalesce ( ph1.phone_no, ' – ') AS 'office_no' 'coalesce (ph2 .phone_no, ' – ') AS 'cell_no' FROM employees e LEFT JOIN employee_phone ph1 ON ph1.emp_id = e.id AND ph1.type = 'office' LEFT JOIN employee_phone ph2 ON ph2 .emp_id = e.id AND ph2 .type = 'mobile' The tables employees and employee_phone are InnoDB tables; all columns are used in this view. The contents of the phone_list view are as follows: Mysql select * from phone_list; 1 row in set (0.00 sec) Which method can you use to change the cell_no value to '555-8888' for John Doe?()A、INSERT INTO employee_phone (emp_id, phone_no, type) VALUES (1, '555-8888','mobile')B、UPDATE phone_list SET cell_name '555-8888' WHERE first_name= 'John' and last_name= 'Doe'C、DELETE FROM phone_list WHERE first_name= 'John' and last_name= 'Doe'; INSERT INTO phone_list (first_name, last_name, office_no, cell_no) VALUES ('John' , 'Doe' , 'x1234' , '555-8888)D、UPDATE employee_phone SET phone_no= '555-8888' where emp_id=1

考题 You are a desktop administrator for your company. A company user reports that he is unable to use his Bluetooth-enabled mobile phone with his Bluetooth-enabled Windows XP Professional computer. He is trying to play audio from the phone through the speakers on his computer. You verify that other Bluetooth devices work properly with the user’s computer. You test the speakers to make sure they are in working order. You also verify that the mobile phone can send output to a computer. You then discover that the phone cannot detect the computer.You need to ensure that the user can use the phone with his computer. What should you do?()A、Place the phone in Bluetooth discovery mode.B、Place the user’s computer in Bluetooth discovery mode.C、Add the phone and the computer to the same Bluetooth Personal Area Network (PAN).D、Install mobile phone synchronization software on the user’s computer.

考题 单选题An SSL VPN can be used in conjunction with IBM Tivoli Access Manager for Enterprise Single Sign-On to provide remote access to business critical information. Which statement is true about the Mobile ActiveCode (MAC) when it is used with a VPN Solution for remote access?()A The MAC can only be delivered to a mobile phone and is good for a single use only.B The MAC can be delivered by mobile phone, e-mail, or fax, and it is good for one time authentication only.C The MAC can only be delivered to a mobile phone and it is good until the expiration time is reached, as set by an administrator.D The MAC can be delivered by mobile phone, email, or fax, and it is good until the expiration time is reached, as set by an administrator.

考题 单选题A customer has a question about the repairs needed for their desktop computer. While asking their question to a technician, the technician receives a personal phone call on their cell phone. Which of the following should the technician do NEXT?()A Ask the customer to wait and answer the phone call.B Talk on the phone while listening to the customer.C Hand the phone to a coworker to answer the call.D Silence the phone and then listen to the customer.

考题 单选题Which of the following is NOT a security feature relating to user accounts?()A Some commands can be password protected requiring logged in customers to re-enter their password.B A user account can be disabled automatically, after a specified number of invalid login attempts.C An account can have multiple valid passwords at the same time, any of which can be used to access the account.D The password policy feature can allow the system to require passwords to include a minimum number of numeric characters.E Logged in customers can be logged off of the system after a specified period of inactivity.

考题 多选题Which three actions are required to access the network statistics on a remote Cisco Unified Wireless IP Phone 7921G via a web browser?()ABrowse to the phone using the MAC address of the phone.BUse HTTPS:// preceding the address of the phone.CChange web access to read/write for the MAC address of the phone on Cisco Unified Communications Manager.DEnter the username and password of the phone.EEnsure that the host is on the same subnet as the remote phone.

考题 单选题A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat()A Incident responseB Asset managementC Patch managementD Policies and procedures

考题 单选题According to the passage, which of the following is TRUE?A Cell phone use is dangerous.B Cell phone use causes cancer.C The human brain is an electromagnetic field.D There are about 5 billion cell phone users in the world right now.

考题 单选题Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A The cell phone should require a password after a set period of inactivity.B The cell phone should only be used for company related emails.C The cell phone data should be encrypted according to NIST standards.D The cell phone should have data connection abilities disabled.

考题 单选题According to the passage, which of the following statements is TRUE?A After the cell-phone ban is ended, students can use their phones during class.B The cell-phone ban is equally enforced in all public schools.C The cell-phone ban was put into place in 2008 under mayor Bill de Blasio.D A phone-storage industry has appeared outside the 88 metal-detector campuses.

考题 单选题A user reports that their cell phone battery is dead and cannot hold a charge. Which of the following should be done when disposing of the old battery?()A Recycle the battery.B Store the battery.C Place battery in a sealed plastic bag.D Disassemble the battery.

考题 单选题Review the definition of the phone_list view. CHEATE OR REPLACE ALGORITHM=MERGE DEFINER= 'root'@localhost' SQL SECURITY DEFINER VIEW 'phone_list' AS SELECT e . id as id 'e . first_name AS 'first_name' 'e . last_name AS 'last_name' 'coalesce ( ph1.phone_no, ' – ') AS 'office_no' 'coalesce (ph2 .phone_no, ' – ') AS 'cell_no' FROM employees e LEFT JOIN employee_phone ph1 ON ph1.emp_id = e.id AND ph1.type = 'office' LEFT JOIN employee_phone ph2 ON ph2 .emp_id = e.id AND ph2 .type = 'mobile' The tables employees and employee_phone are InnoDB tables; all columns are used in this view. The contents of the phone_list view are as follows: Mysql select * from phone_list; 1 row in set (0.00 sec) Which method can you use to change the cell_no value to '555-8888' for John Doe?()A INSERT INTO employee_phone (emp_id, phone_no, type) VALUES (1, '555-8888','mobile')B UPDATE phone_list SET cell_name '555-8888' WHERE first_name= 'John' and last_name= 'Doe'C DELETE FROM phone_list WHERE first_name= 'John' and last_name= 'Doe'; INSERT INTO phone_list (first_name, last_name, office_no, cell_no) VALUES ('John' , 'Doe' , 'x1234' , '555-8888)D UPDATE employee_phone SET phone_no= '555-8888' where emp_id=1

考题 单选题Which of the following is the main idea of the passage?A New York City will give financial aid to poor students.B New York City plans to restrict cell phone use in libraries.C New York City plans to install metal detectors in all public schools.D New York City will soon end a ban on cell phones in schools.

考题 单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A WEP encryptionB Channel rotationC Disable SSIDD WPA encryption

考题 单选题You are a desktop administrator for your company. A company user reports that he is unable to use his Bluetooth-enabled mobile phone with his Bluetooth-enabled Windows XP Professional computer. He is trying to play audio from the phone through the speakers on his computer. You verify that other Bluetooth devices work properly with the user’s computer. You test the speakers to make sure they are in working order. You also verify that the mobile phone can send output to a computer. You then discover that the phone cannot detect the computer.You need to ensure that the user can use the phone with his computer. What should you do?()A Place the phone in Bluetooth discovery mode.B Place the user’s computer in Bluetooth discovery mode.C Add the phone and the computer to the same Bluetooth Personal Area Network (PAN).D Install mobile phone synchronization software on the user’s computer.