计算机类
公务员类
工程类
语言类
金融会计类
计算机类
医学类
研究生类
专业技术资格
职业技能资格
学历类
党建思政类
行业认证
全国计算机应用水平考试(NIT)
计算机软件水平考试
计算机等级考试(NCRE)
全国高校计算机等级考试CCT
行业认证
信息素养
(ISC)²注册信息系统安全专家(CISSP)认证
微软认证
IBM
Lotus
Sun
OCA
Cisco(思科)
Adobe
HP
Linux
CIW
JAVA
Red Hat
华为认证
北大青鸟ACCP认证
印度NIIT认证
(ISC)²注册信息系统安全专家(CISSP)认证
布线测试认证工程师培训考试(CCTT)
趋势科技认证信息安全专家(TSCP)
OCP
OCM
单选题Whattypeoftechnologyisrepresentedinthegraphicthatfollows?
进入题库练习
单选题Management support is critical to the success of a business continuity plan. Which of the following is the most important to be provided to management to obtain their support?
进入题库练习
单选题Which of the following indicates to a packet where to go and how to communicate with the right service or protocol on the destination computer?
进入题库练习
单选题Whattypeofriskanalysisapproachdoesthefollowinggraphicprovide?
进入题库练习
单选题Whattypeoftelecommunicationtechnologyisillustratedinthegraphicthatfollows?
进入题库练习
单选题Layer 2 of the OSI model has two sublayers. What are those sublayers, and what are two IEEE standards that describe technologies at that layer?
进入题库练习
单选题There are different ways that operating systems can carry out software I/O procedures. Which of the following is used when the CPU sends data to an I/O device and then works on another process's request until the I/O device is ready for more data?
进入题库练习
单选题Risk assessment has several different methodologies. Which of the following official risk methodologies was not created for the purpose of analyzing security risks?
进入题库练习
单选题Whatarethethreetypesofpoliciesthataremissingfromthefollowinggraphic?
进入题库练习
单选题Amultitaskingoperatingsystemcanhaveseveralprocessesrunningatthesametime.Whatarethecomponentswithintheprocessesthatareshowninthegraphicthatfollows?
进入题库练习
单选题The operations team is responsible for defining which data gets backed up and how often. Which type of backup process backs up files that have been modified since the last time all data was backed up?
进入题库练习
单选题Differenttypesofmaterialarebuiltintowallsandotherconstructsofvarioustypesofbuildingsandfacilities.Whattypeofmaterialisshowninthefollowingphoto?
进入题库练习
单选题Tom works at a large retail company that recently deployed radio-frequency identification (RFID) to better manage its inventory processes. Employees use scanners to gather product-related information instead of manually looking up product data. Tom has found out that malicious customers have carried out attacks on the RFID technology to reduce the amount they pay on store items. Which of the following is the most likely reason for the existence of this type of vulnerability?
进入题库练习
单选题The following scenario will be used for questions 28 and 29.Jack has been told that successful attacks have been taking place and data that have been encrypted by his company's software systems have leaked to the company's competitors. Through Jack's investigation he has discovered that the lack of randomness in the seeding values used by the encryption algorithms in the company's software uncovered patterns and allowed for successful reverse engineering.
进入题库练习
单选题Which of the following correctly best describes an object-oriented database?
进入题库练习
单选题Jill is establishing a companywide sales program that will require different user groups with different privileges to access information on a centralized database. How should the security manager secure the database?
进入题库练习
单选题Severaldifferenttypesofsmokeandfiredetectorscanbeused.Whattypeofdetectorisshowninthefollowinggraphic?
进入题库练习
单选题As his company's business continuity coordinator, Matthew is responsible for helping recruit members to the business continuity planning (BCP) committee. Which of the following does not correctly describe this effort?
进入题库练习
单选题Which of the following is a correct description of the pros and cons associated with third-generation programming languages?
进入题库练习
单选题Whattypeofsecurityencryptioncomponentismissingfromthetablethatfollows?
进入题库练习
(ISC)²注册信息系统安全专家(CISSP)认证