计算机类
公务员类
工程类
语言类
金融会计类
计算机类
医学类
研究生类
专业技术资格
职业技能资格
学历类
党建思政类
单选题There are several types of volumetric IDSs. What type of IDS emits a measurable magnetic field that it monitors for disruptions?
进入题库练习
单选题Which of the following is considered the second generation of programming languages?
进入题库练习
单选题Cross-site scripting (XSS) is an application security vulnerability usually found in Web applications. What type of XSS vulnerability occurs when a victim is tricked into opening a URL programmed with a rogue script to steal sensitive information?
进入题库练习
单选题Hannah has been assigned the task of installing Web access management (WAM) software. What is the best description for what WAM is commonly used for?
进入题库练习
单选题Before an effective physical security program can be rolled out, a number of steps must be taken. Which of the following steps comes first in the process of rolling out a security program?
进入题库练习
单选题______is a set of extensions to DNS that provides to DNS clients (resolvers) origin authentication of DNS data to reduce the threat of DNS poisoning, spoofing, and similar attack types.
进入题库练习
单选题Several teams should be involved in carrying out the business continuity plan. Which team is responsible for starting the recovery of the original site?
进入题库练习
单选题The common law system is broken down into which of the following categories?
进入题库练习
单选题David is preparing a server room at a new branch office. What locking mechanisms should he use for the primary and secondary server room entry doors?
进入题库练习
单选题Sam is the security manager of a company that makes most of its revenue from its intellectual property. Sam has implemented a process improvement program that has been certified by an outside entity. His company received a Level 2 during an appraisal process, and he is putting in steps to increase this to a Level 3. A year ago when Sam carried out a risk analysis, he determined that the company was at too much of a risk when it came to potentially losing trade secrets. The countermeasure his team implemented reduced this risk, and Sam determined that the annualized loss expectancy of the risk of a trade secret being stolen once in a hundred-year period is now $400.
进入题库练习
单选题Which of the following does not describe privacy-aware role-based access control?
进入题库练习
单选题There are several types of intrusion detection systems (IDSs). What type of IDS builds a profile of an environment"s normal activities and assigns an anomaly score to packets based on the profile?
进入题库练习
单选题The NIST organization has defined best practices for creating continuity plans. Which of the following phases deals with identifying and prioritizing critical functions and systems?
进入题库练习
单选题Whattechnologywithinidentitymanagementisillustratedinthegraphicthatfollows?
进入题库练习
单选题WhichtypeofWANtunnelingprotocolismissingfromthetablethatfollows?
进入题库练习
单选题The relay agent on a mail server plays a role in spam prevention. Which of the following incorrectly describes mail relays?
进入题库练习
单选题The integrity of data is not related to which of the following?
进入题库练习
单选题Authorization creep is to access controls what scope creep is to software development. Which of the following is not true of authorization creep?
进入题库练习
单选题A change management process should include a number of procedures. Which of the following incorrectly describes a characteristic or component of a change control policy?
进入题库练习
单选题Paisley is helping her company identify potential site locations for a new facility. Which of the following is not an important factor when choosing a location?
进入题库练习