(ISC)²注册信息系统安全专家(CISSP)认证2021年1月21日每日一练
单选题Which of the following best describes the relationship between CobiT and ITIL?
实现机密性,使用以下哪个算法?
单选题Robert has been asked to increase the overall efficiency of the sales database by implementing a procedure that structures data to minimize duplication and inconsistencies. What procedure is this?
单选题Sarah and her security team have carried out many vulnerability tests over the years to locate the weaknesses and vulnerabilities within the systems on the network. The CISO has asked her to oversee the development of a threat model for the network. Which of the following best describes what this model is and what it would be used for?
单选题Today, satellites are used to provide wireless connectivity between different locations. What two prerequisites are needed for two different locations to communicate via satellite links?
SDLC 中,那个过程进行安全鉴别(identification)?
单选题Phishing and pharming are similar. Which of the following correctly describes the difference between phishing and pharming?
单选题Barry has just been hired as the company security officer at an international financial institution. He has reviewed the company"s data protection policies and procedures. He sees that the company stores its sensitive data within a secured database. The database is located in a network segment all by itself, which is monitored by a network-based intrusion detection system. The database is hosted on a server kept within a server room, which can only be accessed by personnel with the correct PIN value and smart card. Barry finds that the sensitive data backups are not being properly secured and requests that the company implement a secure courier service that moves backup tapes to a secured location. His management states that this option is too expensive, so Barry implements a local hierarchy storage management system that properly protects the sensitive data.
杀毒软件匹配内部已知规则,问是哪种?
输入 id,密码后,还要输入手机接收到的 pin 码,pin 属于你知道的还是拥有的?