计算机类
公务员类
工程类
语言类
金融会计类
计算机类
医学类
研究生类
专业技术资格
职业技能资格
学历类
党建思政类
行业认证
全国计算机应用水平考试(NIT)
计算机软件水平考试
计算机等级考试(NCRE)
全国高校计算机等级考试CCT
行业认证
信息素养
(ISC)²注册信息系统安全专家(CISSP)认证
微软认证
IBM
Lotus
Sun
OCA
Cisco(思科)
Adobe
HP
Linux
CIW
JAVA
Red Hat
华为认证
北大青鸟ACCP认证
印度NIIT认证
(ISC)²注册信息系统安全专家(CISSP)认证
布线测试认证工程师培训考试(CCTT)
趋势科技认证信息安全专家(TSCP)
OCP
OCM
单选题During an incident response, what stage involves mitigating the damage caused by an incident?
进入题库练习
单选题Which of the following correctly describes the difference between public key cryptography and public key infrastructure?
进入题库练习
单选题ISO/IEC 27000 is part of a growing family of ISO/IEC information security management systems (ISMS) standards. It comprises information security standards published jointly by the International Organization for Standardization (ISO) and the International Electro-technical Commission (IEC). Which of the following provides an incorrect mapping of the individual standards that make up this family of standards?
进入题库练习
单选题Which of the following does not describe IP telephony security?
进入题库练习
单选题WhichtypeofWANtunnelingprotocolismissingfromthetablethatfollows?
进入题库练习
单选题Therearemanydifferenttypesofaccesscontrolmechanismsthatarecommonlyembeddedintoalloperatingsystems.Whichofthefollowingisthemechanismthatismissinginthisgraphic?
进入题库练习
单选题A number of measures should be taken to help protect devices and the environment from electric power issues. Which of the following is best to keep voltage steady and power clean?
进入题库练习
单选题Thereareseveraldifferenttypesofcentralizedaccesscontrolprotocols.Whichofthefollowingisillustratedinthegraphicthatfollows?
进入题库练习
单选题Mirroringofdrivesiswhendataiswrittentotwodrivesatonceforredundancypurposes.Whatsimilartypeoftechnologyisshowninthegraphicthatfollows?
进入题库练习
单选题Mary is creating malicious code that will steal a user's cookies by modifying the original client-side Java script. What type of cross-site scripting vulnerability is she exploiting?
进入题库练习
单选题Alex works for a chemical distributor that assigns employees tasks that separate their duties and routinely rotates job assignments. Which of the following best describes the differences between these countermeasures?
进入题库练习
单选题Which of the following was the first international treaty seeking to address computer crimes by coordinating national laws and improving investigative techniques and international cooperation?
进入题库练习
单选题The following scenario applies to questions 28 and 29.Tim's development team is designing a new operating system. One of the requirements of the new product is that critical memory segments need to be categorized as nonexecutable, with the goal of reducing malicious code from being able to execute instructions in privileged mode. The team also wants to make sure that attackers will have a difficult time predicting execution target addresses.
进入题库练习
单选题What markup language allows for the sharing of application security policies to ensure that all applications are following the same security rules?
进入题库练习
单选题Therearedifferentwaysthatspecifictechnologiescancreateone-timepasswordsforauthenticationpurposes.Whattypeoftechnologyisillustratedinthegraphicthatfollows?
进入题库练习
单选题Inaredundantarrayofinexpensivedisks(RAID)systems,dataandparityinformationarestripedoverseveraldifferentdisks.Whatisparityinformationusedfor?
进入题库练习
单选题Thereareseveraldifferenttypesoftechnologieswithincryptographythatprovideconfidentiality.Whatisrepresentedinthegraphicthatfollows?
进入题库练习
单选题As head of sales, Jim is the information owner for the sales department. Which of the following is not Jim's responsibility as information owner?
进入题库练习
单选题Anaccesscontrolmatrixisusedinmanyoperatingsystemsandapplicationstocontrolaccessbetweensubjectsandobjects.Whatisthecolumninthistypeofmatrixreferredtoas?AccessControlMatrix
进入题库练习
单选题What was the direct predecessor to Standard Generalized Markup Language(SGML)?
进入题库练习
(ISC)²注册信息系统安全专家(CISSP)认证