计算机类
公务员类
工程类
语言类
金融会计类
计算机类
医学类
研究生类
专业技术资格
职业技能资格
学历类
党建思政类
黑客使用硬件密钥存储比软件密钥存储的优势是?
进入题库练习
关于网络层走什么数据的题
进入题库练习
一个安全经理到一家公司,发现其有洪泛攻击,为了解决此问题,且又要公司相关WEB上的应用不能停止,应采用的方式为:
进入题库练习
法律、法规、合规是用来指导生成:
进入题库练习
一个信息系统,用户管理人员在使用系统时不能使用系统管理员的功能,系统管理员不能使用用户管理人员的功能,问这是什么控制?
进入题库练习
单选题A business impact analysis is considered a functional analysis. Which of the following is not carried out during a business impact analysis?
进入题库练习
哪一个能供提供最有效的实时的容错机制:
进入题库练习
有个审计师要审计隐私策略,第一步是
进入题库练习
单选题What concept states that a criminal leaves something behind and takes something with them?
进入题库练习
以下哪个会引起最严重的道德问题?
进入题库练习
S/MIME 是靠什么来交换密钥
进入题库练习
单选题Which of the following best describes the relationship between CobiT and ITIL?
进入题库练习
单选题Robert has been asked to increase the overall efficiency of the sales database by implementing a procedure that structures data to minimize duplication and inconsistencies. What procedure is this?
进入题库练习
单选题The following scenario will be used to answer questions 28 and 29.Sean has been hired as business continuity coordinator. He has been told by his management that he needed to ensure that the company is in compliance with the ISO/IEC standard that pertained to technology readiness for business continuity. He has also been instructed to find a way to transfer the risk of being unable to carry out critical business functions for a period of time because of a disaster.
进入题库练习
单选题An approach to alternate offsite facilities is to establish a reciprocal agreement. Which of the following describes the pros and cons of a reciprocal agreement?
进入题库练习
出口时设置智能卡读卡器的作用:
进入题库练习
单选题The Zachman Architecture Framework is often used to set up an enterprise security architecture. Which of the following does not correctly describe the Zachman Framework?
进入题库练习
单选题IPv6 has many new and different characteristics and functionality compared to IPv4. Which of the following is an incorrect functionality or characteristic of IPv6? i. IPv6 allows for nonscoped addresses, which enables an administrator to restrict specific addresses for specific servers or file and print sharing, for example. ii. IPv6 has IPSec integrated into the protocol stack, which provides application-based secure transmission and authentication, iii. IPv6 has more flexibility and routing capabilities compared to IPv4 and allows for Quality of Service (QoS) priority values to be assigned to timesensitive transmissions. iv. The protocol offers autoconfiguration, which makes administration much easier compared to IPv4, and it does not require network address translation (NAT) to extend its address space.
进入题库练习
单选题Sarah and her security team have carried out many vulnerability tests over the years to locate the weaknesses and vulnerabilities within the systems on the network. The CISO has asked her to oversee the development of a threat model for the network. Which of the following best describes what this model is and what it would be used for?
进入题库练习
单选题Sue has been tasked with implementing a number of security controls, including antivirus and antispam software, to protect the company's e-mail system. What type of approach is her company taking to handle the risk posed by the system?
进入题库练习