计算机类
公务员类
工程类
语言类
金融会计类
计算机类
医学类
研究生类
专业技术资格
职业技能资格
学历类
党建思政类
行业认证
全国计算机应用水平考试(NIT)
计算机软件水平考试
计算机等级考试(NCRE)
全国高校计算机等级考试CCT
行业认证
信息素养
单选题Michael is charged with developing a classification program for his company. Which of the following should he do first?
进入题库练习
单选题Encryption can happen at different layers of an operating system and network stack. Where does PPTP encryption take place?
进入题库练习
单选题Harrison is evaluating access control products for his company. Which of the following is not a factor he needs to consider when choosing the products?
进入题库练习
单选题Thereareseveraltypesofredundanttechnologiesthatcanbeputintoplace.Whattypeoftechnologyisshowninthegraphicthatfollows?
进入题库练习
单选题CGTV can use fixed focal length or varifocal lenses. Which of the following correctly describes the lenses used in CCTV?
进入题库练习
单选题Steve, a department manager, has been asked to join a committee that is responsible for defining an acceptable level of risk for the organization, reviewing risk assessment and audit reports, and approving significant changes to security policies and programs. What committee is he joining?
进入题库练习
单选题Thereareseveraldifferenttypesofimportantarchitectureswithinpublickeyinfrastructures.Whicharchitecturedoesthegraphicthatfollowsrepresent?
进入题库练习
单选题Various levels of RAID dictate the type of activity that will take place within the RAID system. Which level is associated with byte-level parity?
进入题库练习
单选题Brad is a security manager at Thingamabobs Inc. He is preparing a presentation for his company"s executives on the risks of using instant messaging (IM) and his reasons for wanting to prohibit its use on the company network. Which of the following should not be included in his presentation?
进入题库练习
单选题A rule-based IDS takes a different approach than a signature-based or anomaly based system. Which of the following is characteristic of a rule-based IDS?
进入题库练习
单选题When an organization is unsure of the final nature of the product, what type of system development method is most appropriate for them?
进入题库练习
单选题Which of the following does not correctly describe a directory service?
进入题库练习
单选题Which of the following is a light-sensitive chip used in most of today's CCTV cameras?
进入题库练习
单选题Which of the following correctly describes a drawback of symmetric key systems?
进入题库练习
单选题Which of the following describes the type of construction materials most commonly used to build a bank's exterior walls?
进入题库练习
单选题During an incident response, what stage involves mitigating the damage caused by an incident?
进入题库练习
单选题Which of the following correctly describes the difference between public key cryptography and public key infrastructure?
进入题库练习
单选题ISO/IEC 27000 is part of a growing family of ISO/IEC information security management systems (ISMS) standards. It comprises information security standards published jointly by the International Organization for Standardization (ISO) and the International Electro-technical Commission (IEC). Which of the following provides an incorrect mapping of the individual standards that make up this family of standards?
进入题库练习
单选题Which of the following does not describe IP telephony security?
进入题库练习
单选题WhichtypeofWANtunnelingprotocolismissingfromthetablethatfollows?
进入题库练习