计算机类
公务员类
工程类
语言类
金融会计类
计算机类
医学类
研究生类
专业技术资格
职业技能资格
学历类
党建思政类
行业认证
全国计算机应用水平考试(NIT)
计算机软件水平考试
计算机等级考试(NCRE)
全国高校计算机等级考试CCT
行业认证
信息素养
单选题What of the following allows security personnel to change the field of view of a CCTV lens to different angles and distances?
进入题库练习
单选题Bob is a new security administrator at a financial institution. The organization has experienced some suspicious activity on one of the critical servers that contain customer data. When reviewing how the systems are administered, he uncovers some concerning issues pertaining to remote administration. Which of the following should not be put into place to reduce these concerns?i. Commands and data should not be sent in cleartext.ii. SSH should be used, not Telnet.iii. Truly critical systems should be administered locally instead of remotely.iv. Only a small number of administrators should be able to carry out remote functionality.v. Strong authentication should be in place for any administration activities.
进入题库练习
单选题Thereareseveraldifferenttypesofsinglesign-onprotocolsandtechnologiesinusetoday.Whattypeoftechnologyisillustratedinthegraphicthatfollows?
进入题库练习
单选题The following scenario will be used for questions 29 and 30.John is a network administrator and has been told by one of his network staff members that two servers on the network have recently had suspicious traffic traveling to them and then from them in a sporadic manner. The traffic has been mainly ICMP, but the patterns were unusual compared to other servers over the last 30 days. John lists the directories and subdirectories on the systems and finds nothing unusual. He inspects the running processes and again finds nothing suspicious. He sees that the systems' NICs are not in promiscuous mode, so he is assured that sniffers have not been planted.
进入题库练习
单选题Which of the following correctly describes Direct Access and Sequential Access storage devices?
进入题库练习
单选题Which of the following best describes why e-mail spoofing is easily executed?
进入题库练习
单选题The importance of protecting audit logs generated by computers and network devices is highlighted by the fact that it is required by many of today"s regulations. Which of the following does not explain why audit logs should be protected?
进入题库练习
单选题Emily is listening to network traffic and capturing passwords as they are sent to the authentication server. She plans to use the passwords as part of a future attack. What type of attack is this?
进入题库练习
单选题Which organization has been developed to deal with economic, social, and governance issues, and with how sensitive data is transported over borders?
进入题库练习
单选题Whattypeofsecurityencryptioncomponentismissingfromthetablethatfollows?
进入题库练习
单选题Which of the following is not true of a forensics investigation?
进入题库练习
单选题Which of the following is not a reason to develop and implement a disaster recovery plan?
进入题库练习
单选题Which of the following is not included in a risk assessment?
进入题库练习
单选题IP telephony networks require the same security measures as those implemented on an IP data network. Which of the following is unique to IP telephony?
进入题库练习
单选题Thereareseveraldifferenttypesofsinglesign-onprotocolsandtechnologiesinusetoday.Whattypeoftechnologyisillustratedinthegraphicthatfollows?
进入题库练习
单选题ThereareseveraldifferentimportantpiecestotheCommonCriteria.Whichofthefollowingbestdescribesthefirstofthemissingcomponents?
进入题库练习
单选题What is the difference between hierarchical storage management and storage area network technologies?
进入题库练习
单选题What type of common law deals with violations committed by individuals against government laws, which are created to protect the public?
进入题库练习
单选题A number of factors need to be considered when buying and implementing a CCTV system. Which of the following is the primary factor in determining whether a lens should have a manual iris or an auto-iris?
进入题库练习
单选题Whatobject-orientedprogrammingterm,orconcept,isillustratedinthegraphicthatfollows?
进入题库练习