计算机类
公务员类
工程类
语言类
金融会计类
计算机类
医学类
研究生类
专业技术资格
职业技能资格
学历类
党建思政类
行业认证
全国计算机应用水平考试(NIT)
计算机软件水平考试
计算机等级考试(NCRE)
全国高校计算机等级考试CCT
行业认证
信息素养
单选题There are classifications for operating system failures. Which of the following refers to what takes place when an unexpected kernel or media failure happens and the regular recovery procedure cannot recover the system to a more consistent state, requiring an administrator to intervene?
进入题库练习
单选题Which of the following means that a company did all it could have reasonably done to prevent a security breach?
进入题库练习
单选题There are several methods an intruder can use to gain access to company assets. Which of the following best describes masquerading?
进入题库练习
单选题Which of the following best describes how a digital signature is created?
进入题库练习
单选题Lee is a new security manager who is in charge of ensuring that his company complies with the European Union Principles on Privacy when his company is interacting with their European partners. The set of principles that deals with transmitting data considered private is encompassed within which of the following laws or regulations?
进入题库练习
单选题Which of the following best describes the role of the Java Virtual Machine in the execution of Java applets?
进入题库练习
单选题Which of the following incorrectly describes steganography?
进入题库练习
单选题Sally is responsible for key management within her organization. Which of the following incorrectly describes a principle of secure key management?
进入题库练习
单选题Brandy could not figure out how Sam gained unauthorized access to her system, since he has little computer experience. Which of the following is most likely the attack Sam used?
进入题库练习
单选题Different countries have different legal systems. Which of the following correctly describes customary law?
进入题库练习
单选题Device backup and other availability solutions are chosen to balance the value of having information available against the cost of keeping that information available. Which of the following best describes fault-tolerant technologies?
进入题库练习
单选题The following scenario applies to questions 30, 31, and 32.Operating systems have evolved and changed over the years. The earlier operating systems were monolithic and did not segregate critical processes from noncritical processes. As time went on operating system vendors started to reduce the amount of programming code that ran in kernel mode. Only the absolutely necessary code ran in kernel mode, and the remaining operating system code ran in user mode. This architecture introduced performance issues, which required the operating system vendors to reduce the critical operating system functionality to microkernels and allow the remaining operating system functionality to run in client/server models within kernel mode.
进入题库练习
单选题Fred has been told he needs to test a component of the new content management application under development to validate its data structure, logic, and boundary conditions. What type of testing should he carry out?
进入题库练习
单选题Several different tunneling protocols can be used in dial-up situations. Which of the following would be best to use as a VPN tunneling solution?
进入题库练习
单选题What of the following allows security personnel to change the field of view of a CCTV lens to different angles and distances?
进入题库练习
单选题Bob is a new security administrator at a financial institution. The organization has experienced some suspicious activity on one of the critical servers that contain customer data. When reviewing how the systems are administered, he uncovers some concerning issues pertaining to remote administration. Which of the following should not be put into place to reduce these concerns?i. Commands and data should not be sent in cleartext.ii. SSH should be used, not Telnet.iii. Truly critical systems should be administered locally instead of remotely.iv. Only a small number of administrators should be able to carry out remote functionality.v. Strong authentication should be in place for any administration activities.
进入题库练习
单选题Thereareseveraldifferenttypesofsinglesign-onprotocolsandtechnologiesinusetoday.Whattypeoftechnologyisillustratedinthegraphicthatfollows?
进入题库练习
单选题The following scenario will be used for questions 29 and 30.John is a network administrator and has been told by one of his network staff members that two servers on the network have recently had suspicious traffic traveling to them and then from them in a sporadic manner. The traffic has been mainly ICMP, but the patterns were unusual compared to other servers over the last 30 days. John lists the directories and subdirectories on the systems and finds nothing unusual. He inspects the running processes and again finds nothing suspicious. He sees that the systems' NICs are not in promiscuous mode, so he is assured that sniffers have not been planted.
进入题库练习
单选题Which of the following correctly describes Direct Access and Sequential Access storage devices?
进入题库练习
单选题Which of the following best describes why e-mail spoofing is easily executed?
进入题库练习