计算机类
公务员类
工程类
语言类
金融会计类
计算机类
医学类
研究生类
专业技术资格
职业技能资格
学历类
党建思政类
行业认证
全国计算机应用水平考试(NIT)
计算机软件水平考试
计算机等级考试(NCRE)
全国高校计算机等级考试CCT
行业认证
信息素养
(ISC)²注册信息系统安全专家(CISSP)认证
微软认证
IBM
Lotus
Sun
OCA
Cisco(思科)
Adobe
HP
Linux
CIW
JAVA
Red Hat
华为认证
北大青鸟ACCP认证
印度NIIT认证
(ISC)²注册信息系统安全专家(CISSP)认证
布线测试认证工程师培训考试(CCTT)
趋势科技认证信息安全专家(TSCP)
OCP
OCM
单选题The Information Technology Infrastructure Library(ITIL) consists of five sets of instructional books. Which of the following is considered the core set and focuses on the overall planning of the intended IT services?
进入题库练习
单选题Widgets Inc.'s software development processes are documented and the organization is capable of producing its own standard of software processes. Which of the following Capability Maturity Model Integration levels best describes Widgets Inc.?
进入题库练习
单选题The following scenario will be used to answer questions 30, 31 and 32. Jeff is leading the business continuity group in his company. They have completed a business impact analysis and have determined that if the company's credit card processing functionality was unavailable for 48 hours the company would most likely experience such a large financial hit that it would have to go out of business. The team has calculated that this functionality needs to be up and running within 28 hours after experiencing a disaster for the company to stay in business. The team has also determined that the restoration steps must be able to restore data that are one hour old or less.
进入题库练习
单选题There are two main functions that Trusted Platform Modules (TPMs) carry out within systems today. Which of the following best describes these two functions?
进入题库练习
单选题Both de facto and proprietary interior protocols are in use today. Which of the following is a proprietary interior protocol that chooses the best path between the source and destination?
进入题库练习
单选题Thereareseveraldifferenttypesofdatabases.Whichtypedoesthegraphicthatfollowsillustrate?
进入题库练习
单选题Therearemanydifferenttypesofaccesscontrolmechanismsthatarecommonlyembeddedintoalloperatingsystems.Whichofthefollowingisthemechanismthatismissinginthisgraphic?
进入题库练习
单选题Which of the following best describes how SAML, SOAP, and HTTP commonly work together in an environment that provides Web services?
进入题库练习
单选题Brian has been asked to work on the virtual directory of his company"s new identity management system. Which of the following best describes a virtual directory?
进入题库练习
单选题There are four categories of software licensing. Which of the following refers to software sold at a reduced cost?
进入题库练习
单选题Which of the following describes object-oriented programming deferred commitment?
进入题库练习
单选题What discipline combines the physical environment and sociology issues that surround it to reduce crime rates and the fear of crime?
进入题库练习
单选题Hereisagraphicofabusinesscontinuitypolicy.Whichcomponentismissingfromthisgraphic?
进入题库练习
单选题Which of the following is not a responsibility of the memory manager?
进入题库练习
单选题Certain types of attacks have been made more potent by which of the following advances to microprocessor technology?
进入题库练习
单选题Organizations should keep system documentation on hand to ensure that the system is properly cared for, that changes are controlled, and that the organization knows what's on the system. What does not need to be in this type of documentation?
进入题库练习
单选题Sally is carrying out a software analysis on her company"s proprietary application. She has found out that it is possible for an attacker to force an authorization step to take place before the authentication step is completed successfully. What type of issue would allow for this type of compromise to take place?
进入题库练习
单选题Thereareseveraldifferenttypesofcentralizedaccesscontrolprotocols.Whichofthefollowingisillustratedinthegraphicthatfollows?
进入题库练习
单选题The following scenario will be used for questions 26, 27, and 28.Trent is the new manager of his company's internal software development department. He has been told by his management that the group needs to be compliant with the international standard that provides guidance to organizations in integrating security into the processes used for managing their applications. His new boss told him that he should join and get familiar with the Web Application Security Consortium, and Trent just received an e-mail stating that one of the company's currently deployed applications has a zero day vulnerability.
进入题库练习
单选题It is not unusual for business continuity plans to become out of date. Which of the following is not a reason why plans become outdated?
进入题库练习
(ISC)²注册信息系统安全专家(CISSP)认证