网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat()
A

Incident response

B

Asset management

C

Patch management

D

Policies and procedures


参考答案

参考解析
解析: 暂无解析
更多 “单选题A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat()A Incident responseB Asset managementC Patch managementD Policies and procedures” 相关考题
考题 Which of the following best summarizes the main idea of the text?[A] The Internet is posing a threat to publishers.[B] A new mode of publication is emerging.[C] Authors welcome the new channel for publication.[D] Publication is rendered easier by online service.

考题 Which of the following best summarizes the main idea of the passage?A.The Internet is posing a threat to publishers.B.A new mode of publication is emerging.C.Authors welcome the new channel for publication.D.Publication is rendered easier by online service.

考题 () seeks to perform. root cause investigation as to what is leading identified trends. A、Problem managementB、Incident managementC、Change managementD、Knowledge management

考题 Which of the following should be updated when new computers are purchased?() A. Asset managementB. Change managementC. Cable managementD. Baselines

考题 A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat() A. Incident responseB. Asset managementC. Patch managementD. Policies and procedures

考题 ()seeks to perform root cause investigation as to what is leading identified trendsA.Problem management B.Incident management C.Change management D.Knowledge management

考题 Which Service component in Cisco Unified Communications operate phase identifies and solves reoccurring incidents by analyzing incident trends to identify patterns and systemic conditions()A、Problem ManagementB、Incident ManagementC、Change ManagementD、Systems Monitoring

考题 In the operate phase, providing and maintaining reliable, current information about the WLANsystem hardware, software, and applications pertinent to the system’s individual components andattributes is part of which service component?()A、Problem ManagementB、Configuration ManagementC、Incident ManagementD、Change Management

考题 Which of the following should be updated when new computers are purchased?()A、Asset managementB、Change managementC、Cable managementD、Baselines

考题 In the operate phase, providing and maintaining reliable, current information about the wlan system hardware, software,and applications pertinent to the system’s individual components and attributes is part of which service component?()A、problem managementB、configuration managementC、incident managementD、change management

考题 Which service component in the wireless operate phase helps isolate and resolve an incident?()A、change managementB、configuration managementC、incident managementD、acceptance test plan

考题 Which of the following specifies a set of consistent requirements for a workstation or server?()A、Vulnerability assessmentB、Imaging softwareC、Patch managementD、Configuration baseline

考题 Which of the following is the FIRST thing to consider when designing an email retention policy?()A、 Local laws and industry regulationsB、 Company policies and guidelinesC、 Project guidelines given by stakeholdersD、 Mail server and backup capacity

考题 Which of the following will help protect an operating system from vulnerability?()A、Download free anti-virus programs from the Internet.B、Perform updates from the manufacturers website regularly.C、Using the operating systems email program only to open attachments.D、Monitoring what is displayed on the screen.

考题 Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A、The cell phone should require a password after a set period of inactivity.B、The cell phone should only be used for company related emails.C、The cell phone data should be encrypted according to NIST standards.D、The cell phone should have data connection abilities disabled.

考题 A technician is attempting to determine whether a CAT5 patch cord is a straight-through or acrossover. Which of the following is the BEST to use to determine the cord type?()A、Cable testerB、Loopback cableC、MultimeterD、Extension magnet

考题 A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat()A、Incident responseB、Asset managementC、Patch managementD、Policies and procedures

考题 An administrator needs to implement a security patch policy on the network that adheres to an internal SLA. Which of the following actions BEST achieves this task?()A、Define a test server group, install the patches and if successful schedule installation on production servers.B、Define a test server group, schedule installation on production servers and then install all updates and patches.C、Install the patches during a non-working hour.D、Send an email to all company users and request the best time for installation.

考题 单选题A technician is attempting to determine whether a CAT5 patch cord is a straight-through or acrossover. Which of the following is the BEST to use to determine the cord type?()A Cable testerB Loopback cableC MultimeterD Extension magnet

考题 单选题Which of the following will help protect an operating system from vulnerability?()A Download free anti-virus programs from the Internet.B Perform updates from the manufacturers website regularly.C Using the operating systems email program only to open attachments.D Monitoring what is displayed on the screen.

考题 单选题The company has two thousand servers located around the globe. Which of the following is the BEST method of patch management and deployment?()A Set all servers to automatically download patches from the manufacturer’s website.B Install an internal patch management system and deploy from the system.C Install the patches on each server from a deployment disk.D RDP into each server, manually download and install the patches.

考题 单选题Client exclusion policies are used to mitigate which of the following attacks?()A dictionaryB bit-flip and replayC mac spoofingD man-in-the-middle

考题 单选题Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A The cell phone should require a password after a set period of inactivity.B The cell phone should only be used for company related emails.C The cell phone data should be encrypted according to NIST standards.D The cell phone should have data connection abilities disabled.

考题 单选题A company printer is used to print payroll checks on paper forms with carbon backing. Which ofthe following is the BEST type of printer for this scenario?()A LaserB ImpactC InkjetD Thermal

考题 单选题Which of the following is the FIRST thing to consider when designing an email retention policy?()A  Local laws and industry regulationsB  Company policies and guidelinesC  Project guidelines given by stakeholdersD  Mail server and backup capacity

考题 单选题An administrator needs to implement a security patch policy on the network that adheres to aninternal SLA.  Which of the following actions BEST achieves this task?()A  Define a test server group, install the patches and if successful schedule installation on production servers.B  Define a test server group, schedule installation on production servers and then install all updates and patches.C  Install the patches during a non-working hour.D  Send an email to all company users and request the best time for installation.

考题 单选题An administrator needs to implement a security patch policy on the network that adheres to an internal SLA. Which of the following actions BEST achieves this task?()A Define a test server group, install the patches and if successful schedule installation on production servers.B Define a test server group, schedule installation on production servers and then install all updates and patches.C Install the patches during a non-working hour.D Send an email to all company users and request the best time for installation.