计算机类
公务员类
工程类
语言类
金融会计类
计算机类
医学类
研究生类
专业技术资格
职业技能资格
学历类
党建思政类
行业认证
全国计算机应用水平考试(NIT)
计算机软件水平考试
计算机等级考试(NCRE)
全国高校计算机等级考试CCT
行业认证
信息素养
(ISC)²注册信息系统安全专家(CISSP)认证
微软认证
IBM
Lotus
Sun
OCA
Cisco(思科)
Adobe
HP
Linux
CIW
JAVA
Red Hat
华为认证
北大青鸟ACCP认证
印度NIIT认证
(ISC)²注册信息系统安全专家(CISSP)认证
布线测试认证工程师培训考试(CCTT)
趋势科技认证信息安全专家(TSCP)
OCP
OCM
为每个用户创立了数据库的多个实例,如果区分
进入题库练习
任命安全隐私管 CPO,第一步是:
进入题库练习
TOE 属于
进入题库练习
说要变更数据中心方案,最重要的是什么
进入题库练习
安全要求属于:
进入题库练习
哪个可以通过进行功率差分分析进行攻击?
进入题库练习
FTP 的风险?
进入题库练习
单选题Which of the following best describes the relationship between CobiT and ITIL?
进入题库练习
单选题A business impact analysis is considered a functional analysis. Which of the following is not carried out during a business impact analysis?
进入题库练习
单选题The Zachman Architecture Framework is often used to set up an enterprise security architecture. Which of the following does not correctly describe the Zachman Framework?
进入题库练习
单选题What concept states that a criminal leaves something behind and takes something with them?
进入题库练习
单选题The following scenario will be used to answer questions 28 and 29.Sean has been hired as business continuity coordinator. He has been told by his management that he needed to ensure that the company is in compliance with the ISO/IEC standard that pertained to technology readiness for business continuity. He has also been instructed to find a way to transfer the risk of being unable to carry out critical business functions for a period of time because of a disaster.
进入题库练习
单选题IPv6 has many new and different characteristics and functionality compared to IPv4. Which of the following is an incorrect functionality or characteristic of IPv6? i. IPv6 allows for nonscoped addresses, which enables an administrator to restrict specific addresses for specific servers or file and print sharing, for example. ii. IPv6 has IPSec integrated into the protocol stack, which provides application-based secure transmission and authentication, iii. IPv6 has more flexibility and routing capabilities compared to IPv4 and allows for Quality of Service (QoS) priority values to be assigned to timesensitive transmissions. iv. The protocol offers autoconfiguration, which makes administration much easier compared to IPv4, and it does not require network address translation (NAT) to extend its address space.
进入题库练习
单选题Robert has been asked to increase the overall efficiency of the sales database by implementing a procedure that structures data to minimize duplication and inconsistencies. What procedure is this?
进入题库练习
单选题Sarah and her security team have carried out many vulnerability tests over the years to locate the weaknesses and vulnerabilities within the systems on the network. The CISO has asked her to oversee the development of a threat model for the network. Which of the following best describes what this model is and what it would be used for?
进入题库练习
单选题An approach to alternate offsite facilities is to establish a reciprocal agreement. Which of the following describes the pros and cons of a reciprocal agreement?
进入题库练习
单选题Sue has been tasked with implementing a number of security controls, including antivirus and antispam software, to protect the company's e-mail system. What type of approach is her company taking to handle the risk posed by the system?
进入题库练习
单选题Which of the following is not a characteristic of a company with a security governance program in place?
进入题库练习
单选题Global organizations that transfer data across international boundaries must abide by guidelines and transborder information flow rules developed by an international organization that helps different governments come together and tackle the economic, social, and governance challenges of a globalized economy. What organization is this?
进入题库练习
单选题When an organization splits naming zones, the names of its hosts that are only accessible from an intranet are hidden from the Internet. Which of the following best describes why this is done?
进入题库练习
(ISC)²注册信息系统安全专家(CISSP)认证