加载中...

题库中心

共找到 881 道题目
  • 多选题 企事业内部-IT

    of the following is the primary security feature of a proxy server?

    A、Client hiding

    B、URL blocking

    C、Route blocking

    D、Content filtering

  • 多选题 企事业内部-IT

    What is the most effective means of determining how controls are functioning within an operating system?

    A、Interview with computer operator

    B、Review of software control features and/or parameters

    C、Review of operating system manual

    D、Interview with product vendor

  • 多选题 企事业内部-IT

    The ability to do something with a computer resource can be explicitly enabled or restricted through:

    A、Physical and system-based controls.

    B、Theoretical and system-based controls.

    C、Mental and system-based controls.

    D、Physical and trap-based controls.

  • 多选题 企事业内部-IT

    The following are fire detector types EXCEPT:

    A、smoke activated

    B、flame actuated

    C、acoustical-seismic detection system

    D、heat activated

  • 多选题 企事业内部-IT

    A firewall can be classified as a:

    A、Directory based access control.

    B、Rule based access control.

    C、Lattice based access control.

    D、ID based access control.

  • 多选题 企事业内部-IT

    If the computer system being used contains confidential information, users must not:

    A、Leave their computer without first logging off.

    B、Share their desks.

    C、Encrypt their passwords.

    D、Communicate

  • 多选题 企事业内部-IT

    Which one of the following CANNOT be prevented by the Secure Shell (SSH) program?

    A、Internet Protocol (IP) spoofing.

    B、Data manipulation during transmissions.

    C、Network based birthday attack.

    D、Compromise of the source/destination host.

  • 多选题 企事业内部-IT

    Which of the following OSI layers does not provide confidentiality?

    A、Presentation

    B、Network

    C、Transport

    D、Session

  • 多选题 企事业内部-IT

    Virtual Private Network software typically encrypts all of the following EXCEPT

    A、File transfer protocol

    B、Data link messaging

    C、HTTP protocol

    D、Session information

  • 多选题 企事业内部-IT

    Which of the following steps should be performed first in a business impact analysis (BIA)?

    A、Identify all business units within an organization

    B、Evaluate the impact of disruptive events

    C、Estimate the Recovery Time Objectives (RTO)

    D、Evaluate the criticality of business functions