计算机类
公务员类
工程类
语言类
金融会计类
计算机类
医学类
研究生类
专业技术资格
职业技能资格
学历类
党建思政类
行业认证
全国计算机应用水平考试(NIT)
计算机软件水平考试
计算机等级考试(NCRE)
全国高校计算机等级考试CCT
行业认证
信息素养
(ISC)²注册信息系统安全专家(CISSP)认证
微软认证
IBM
Lotus
Sun
OCA
Cisco(思科)
Adobe
HP
Linux
CIW
JAVA
Red Hat
华为认证
北大青鸟ACCP认证
印度NIIT认证
(ISC)²注册信息系统安全专家(CISSP)认证
布线测试认证工程师培训考试(CCTT)
趋势科技认证信息安全专家(TSCP)
OCP
OCM
单选题Today, satellites are used to provide wireless connectivity between different locations. What two prerequisites are needed for two different locations to communicate via satellite links?
进入题库练习
单选题Whattypeoftelecommunicationtechnologyisillustratedinthegraphicthatfollows?
进入题库练习
单选题Which of the following is not a benefit of VoIP?
进入题库练习
单选题Thefollowinggraphiccontainsacommonlyusedriskmanagementscorecard.Identifytheproperquadrantanditsdescription.
进入题库练习
单选题Which of the following dictates that all evidence be labeled with information indicating who secured and validated it?
进入题库练习
单选题Phishing and pharming are similar. Which of the following correctly describes the difference between phishing and pharming?
进入题库练习
单选题Which of the following best describes exigent circumstances?
进入题库练习
单选题Great care must be taken to capture clues from a computer or device during a forensics exercise. Which of the following does not correctly describe the efforts that should be taken to protect an image?
进入题库练习
单选题Which of the following incorrectly describes IP spoofing and session hijacking?
进入题库练习
单选题Listintheproperorderfromthetableonthetopofthenextpagethelearningobjectivesthataremissingandtheirproperdefinitions.
进入题库练习
单选题Barry has just been hired as the company security officer at an international financial institution. He has reviewed the company"s data protection policies and procedures. He sees that the company stores its sensitive data within a secured database. The database is located in a network segment all by itself, which is monitored by a network-based intrusion detection system. The database is hosted on a server kept within a server room, which can only be accessed by personnel with the correct PIN value and smart card. Barry finds that the sensitive data backups are not being properly secured and requests that the company implement a secure courier service that moves backup tapes to a secured location. His management states that this option is too expensive, so Barry implements a local hierarchy storage management system that properly protects the sensitive data.
进入题库练习
单选题There are classifications for operating system failures. Which of the following refers to what takes place when an unexpected kernel or media failure happens and the regular recovery procedure cannot recover the system to a more consistent state, requiring an administrator to intervene?
进入题库练习
单选题Which of the following means that a company did all it could have reasonably done to prevent a security breach?
进入题库练习
单选题There are several methods an intruder can use to gain access to company assets. Which of the following best describes masquerading?
进入题库练习
单选题Which of the following best describes how a digital signature is created?
进入题库练习
单选题Lee is a new security manager who is in charge of ensuring that his company complies with the European Union Principles on Privacy when his company is interacting with their European partners. The set of principles that deals with transmitting data considered private is encompassed within which of the following laws or regulations?
进入题库练习
单选题Which of the following best describes the role of the Java Virtual Machine in the execution of Java applets?
进入题库练习
单选题Which of the following incorrectly describes steganography?
进入题库练习
单选题Sally is responsible for key management within her organization. Which of the following incorrectly describes a principle of secure key management?
进入题库练习
单选题Brandy could not figure out how Sam gained unauthorized access to her system, since he has little computer experience. Which of the following is most likely the attack Sam used?
进入题库练习
(ISC)²注册信息系统安全专家(CISSP)认证