计算机类
公务员类
工程类
语言类
金融会计类
计算机类
医学类
研究生类
专业技术资格
职业技能资格
学历类
党建思政类
行业认证
全国计算机应用水平考试(NIT)
计算机软件水平考试
计算机等级考试(NCRE)
全国高校计算机等级考试CCT
行业认证
信息素养
(ISC)²注册信息系统安全专家(CISSP)认证
微软认证
IBM
Lotus
Sun
OCA
Cisco(思科)
Adobe
HP
Linux
CIW
JAVA
Red Hat
华为认证
北大青鸟ACCP认证
印度NIIT认证
(ISC)²注册信息系统安全专家(CISSP)认证
布线测试认证工程师培训考试(CCTT)
趋势科技认证信息安全专家(TSCP)
OCP
OCM
单选题ThereareseveraldifferentimportantpiecestotheCommonCriteria.Whichofthefollowingbestdescribesthefirstofthemissingcomponents?
进入题库练习
单选题What is the difference between hierarchical storage management and storage area network technologies?
进入题库练习
单选题What type of common law deals with violations committed by individuals against government laws, which are created to protect the public?
进入题库练习
单选题A number of factors need to be considered when buying and implementing a CCTV system. Which of the following is the primary factor in determining whether a lens should have a manual iris or an auto-iris?
进入题库练习
单选题Whatobject-orientedprogrammingterm,orconcept,isillustratedinthegraphicthatfollows?
进入题库练习
单选题Which of the following correctly describes the relationship between SSL and TLS?
进入题库练习
单选题Databasesandapplicationscommonlycarryoutthefunctionthatisillustratedinthegraphicthatfollows.Whichofthefollowingbestdescribestheconceptthatthisgraphicisshowing?
进入题库练习
单选题Tim"s development team is designing a new operating system. One of the requirements of the new product is that critical memory segments need to be categorized as nonexecutable, with the goal of reducing malicious code from being able to execute instructions in privileged mode. The team also wants to make sure that attackers will have a difficult time predicting execution target addresses.
进入题库练习
单选题DifferentthreatsneedtobeevaluatedandrankedbasedupontheirseverityofbusinessriskwhendevelopingaBCP.Whichrankingapproachisillustratedinthegraphicthatfollows?
进入题库练习
单选题Which of the following is the best way to ensure that the company's backup tapes can be restored and used at a warm site?
进入题库练习
单选题There are often scenarios where the IT staff must react to emergencies and quickly apply fixes or change configurations. When dealing with such emergencies, which of the following is the best approach to making changes?
进入题库练习
单选题The following scenario applies to questions 29, 30, and 31.Barry has just been hired as the company security officer at an international financial institution. He has reviewed the company's data protection policies and procedures. He sees that the company stores its sensitive data within a secured database. The database is located in a network segment all by itself, which is monitored by a network-based intrusion detection system. The database is hosted on a server kept within a server room, which can only be accessed by personnel with the correct PIN value and smart card. Barry finds that the sensitive data backups are not being properly secured and requests that the company implement a secure courier service that moves backup tapes to a secured location. His management states that this option is too expensive, so Barry implements a local hierarchy storage management system that properly protects the sensitive data.
进入题库练习
单选题Brad is installing windows on the storefront of a bank in an area known to be at risk of fires in the dry season. Which of the following is least likely to be true of the windows he is installing?
进入题库练习
单选题Advanced Encryption Standard is an algorithm used for which of the following?
进入题库练习
单选题Encryption can happen at different layers of an operating system and network stack, where does PPTP encryption take place?
进入题库练习
单选题Which of the following is the best way to reduce brute-force attacks that allow intruders to uncover users' passwords?
进入题库练习
单选题Which of the following steps comes first in a business impact analysis?
进入题库练习
单选题Thefollowinggraphiccontainsacommonlyusedriskmanagementscorecard.Identifytheproperquadrantanditsdescription.
进入题库练习
单选题Jared plays a role in his company"s data classification system. In this role, he must practice due care when accessing data and ensure that the data is used only in accordance with allowed policy while abiding by the rules set for the classification of the data. He does not determine, maintain, or evaluate controls, so what is Jared"s role?
进入题库练习
单选题Several types of read-only memory devices can be modified after they are manufactured. Which of the following statements correctly describes the differences between two types of ROM?
进入题库练习
(ISC)²注册信息系统安全专家(CISSP)认证