计算机类
公务员类
工程类
语言类
金融会计类
计算机类
医学类
研究生类
专业技术资格
职业技能资格
学历类
党建思政类
行业认证
全国计算机应用水平考试(NIT)
计算机软件水平考试
计算机等级考试(NCRE)
全国高校计算机等级考试CCT
行业认证
信息素养
单选题An elliptic curve cryptosystem is an asymmetric algorithm. What sets it apart from other asymmetric algorithms?
进入题库练习
单选题Thereareseveraldifferenttypesofimportantarchitectureswithinbackuptechnologies.Whicharchitecturedoesthegraphicthatfollowsrepresent?
进入题库练习
单选题Which security architecture model defines how to securely develop access rights between subjects and objects?
进入题库练习
单选题Protection profiles used in the Common Criteria evaluation process contain five elements. Which of the following establishes the type and intensity of the evaluation?
进入题库练习
单选题Security countermeasures should be transparent to users and attackers. Which of the following does not describe transparency?
进入题库练习
单选题Listintheproperorderfromthetableonthetopofthenextpagethelearningobjectivesthataremissingandtheirproperdefinitions.
进入题库练习
单选题Of the following, what is the primary item that a capability listing is based upon?
进入题库练习
单选题Which of the following best describes the difference between a virtual firewall that works in bridge mode versus one that is embedded into a hypervisor?
进入题库练习
单选题Sarah recently learned that the painting she inherited from a relative and hung in her downtown coffee shop is worth a lot of money. She is worried about its protection and wants to install an IDS. Which of the following intrusion detection systems is the most appropriate for protecting the painting?
进入题库练习
单选题Brian, a security administrator, is responding to a virus infection. The antivirus application reports that a file has been infected with a dangerous virus and disinfecting it could damage the file. What course of action should Brian take?
进入题库练习
单选题Which of the following incorrectly describes how routing commonly takes place on the Internet?
进入题库练习
单选题For evidence to be legally admissible, it must be authentic, complete, sufficient, and reliable. Which characteristic refers to the evidence having a reasonable and sensible relationship to the findings?
进入题库练习
单选题Sally has found out that software programmers in her company are making changes to software components and uploading them to the main software repository without following version control or documenting their changes. This is causing a lot of confusion and has caused several teams to use the older versions. Which of the following would be the best solution for this situation?
进入题库练习
单选题A number of attacks can be performed against smart cards. Side-channel is a class of attacks that doesn"t try to compromise a flaw or weakness. Which of the following is not a side-channel attack?
进入题库练习
单选题Which of the following correctly describes a federated identity and its role within identity management processes?
进入题库练习
单选题The following scenario is to be used for questions 27, 28, and 29.Mike is the new CSO of a large pharmaceutical company. He has been asked to revamp the company's physical security program and better align it with the company's information security practices. Mike knows that the new physical security program should be made up of controls and processes that support the following categories: deterrent, delaying, detection, assessment, and response.
进入题库练习
单选题Which of the following antivirus detection methods is the most recent to the industry and monitors suspicious code as it executes within the operating system?
进入题库练习
单选题Operating systems have evolved and changed over the years. The earlier operating systems were monolithic and did not segregate critical processes from noncritical processes. As time went on operating system vendors started to reduce the amount of programming code that ran in kernel mode. Only the absolutely necessary code ran in kernel mode, and the remaining operating system code ran in user mode. This architecture introduced performance issues, which required the operating system vendors to reduce the critical operating system functionality to microkernels and allow the remaining operating system functionality to run in client/server models within kernel mode.
进入题库练习
单选题Anaccesscontrolmatrixisusedinmanyoperatingsystemsandapplicationstocontrolaccessbetweensubjectsandobjects.Whatisthecolumninthistypeofmatrixreferredtoas?
进入题库练习
单选题Sue has been tasked with implementing a number of security controls, including antivirus and antispam software, to protect the company"s e-mail system, What type of approach is her company taking to handle the risk posed by the system?
进入题库练习