计算机类
公务员类
工程类
语言类
金融会计类
计算机类
医学类
研究生类
专业技术资格
职业技能资格
学历类
党建思政类
行业认证
全国计算机应用水平考试(NIT)
计算机软件水平考试
计算机等级考试(NCRE)
全国高校计算机等级考试CCT
行业认证
信息素养
单选题What discipline combines the physical environment and sociology issues that surround it to reduce crime rates and the fear of crime?
进入题库练习
单选题Hereisagraphicofabusinesscontinuitypolicy.Whichcomponentismissingfromthisgraphic?
进入题库练习
单选题Which of the following is not a responsibility of the memory manager?
进入题库练习
单选题Certain types of attacks have been made more potent by which of the following advances to microprocessor technology?
进入题库练习
单选题Organizations should keep system documentation on hand to ensure that the system is properly cared for, that changes are controlled, and that the organization knows what's on the system. What does not need to be in this type of documentation?
进入题库练习
单选题Sally is carrying out a software analysis on her company"s proprietary application. She has found out that it is possible for an attacker to force an authorization step to take place before the authentication step is completed successfully. What type of issue would allow for this type of compromise to take place?
进入题库练习
单选题Thereareseveraldifferenttypesofcentralizedaccesscontrolprotocols.Whichofthefollowingisillustratedinthegraphicthatfollows?
进入题库练习
单选题The following scenario will be used for questions 26, 27, and 28.Trent is the new manager of his company's internal software development department. He has been told by his management that the group needs to be compliant with the international standard that provides guidance to organizations in integrating security into the processes used for managing their applications. His new boss told him that he should join and get familiar with the Web Application Security Consortium, and Trent just received an e-mail stating that one of the company's currently deployed applications has a zero day vulnerability.
进入题库练习
单选题It is not unusual for business continuity plans to become out of date. Which of the following is not a reason why plans become outdated?
进入题库练习
单选题Differentaccesscontrolmodelsprovidespecifictypesofsecuritymeasuresandfunctionalityinapplicationsandoperatingsystems.Whatmodelisbeingexpressedinthegraphicthatfollows?
进入题库练习
单选题Which of the following incorrectly describes the concept of executive succession planning?
进入题库练习
单选题With what phase of a business continuity plan does a company proceed when it is ready to move back into its original site or a new site?
进入题库练习
单选题After a disaster occurs, a damage assessment needs to take place. Which of the following steps occurs last in a damage assessment?
进入题库练习
单选题Which of the following is the best description of a component-based system development method?
进入题库练习
单选题Cyberlaw categorizes computer-related crime into three categories. Which of the following is an example of a crime in which the use of a computer would be categorized as incidental?
进入题库练习
单选题Which of the following refers to the amount of time it will be expected to take to get a device fixed and back into production?
进入题库练习
单选题What type of exploited vulnerability allows more input than the program has allocated space to store it?
进入题库练习
单选题In computer programming, cohesion and coupling are used to describe modules of code. Which of the following is a favorable combination of cohesion and coupling?
进入题库练习
单选题Whatarethethreetypesofpoliciesthataremissingfromthefollowinggraphic?
进入题库练习
单选题Whattypeofinfrastructuralsetupisillustratedinthegraphicthatfollows?
进入题库练习