网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Guards are appropriate whenever the function required by the security program involves which of the following?守卫合适执行安全程序所涉及以下哪一项功能?()
- A、The use of discriminating judgment使用辨别判断能力的时候
- B、The use of physical force使用暴力的时候
参考答案
更多 “Guards are appropriate whenever the function required by the security program involves which of the following?守卫合适执行安全程序所涉及以下哪一项功能?()A、The use of discriminating judgment使用辨别判断能力的时候B、The use of physical force使用暴力的时候” 相关考题
考题
Bob, a support technician, is trying to locate a particular registry key using REGEDIT.EXE, on aWindows 2000 PC. Which of the following is the BEST method of doing this?()
A. Use the import function from the File menu.B. Use the find function in the Edit menu.C. Use the display binary data function in the View menu.D. Navigate through the registry sub-trees.
考题
Which of the following is the BEST approach a technician should take when informing a customerabout their findings of any specific computer problem?()
A. Use non-technical terms.B. Use the appropriate acronyms.C. Use proper technical terms.D. Use email to ensure a written record.
考题
A software update was installed using the Apply option, however the update is no longer required. Which of the following procedures should be performed to remove the update?()
A.Use the Reject optionB.Delete the update form the /usr/lpp directoriesC.Use the Force Overwrite option to re-install the earlier versionD.Commit the update and then remove the updated product filesets using SMIT
考题
Which of the following procedures is safest perform when updating licensed program products?()
A.Load all updates in the commit stateB.Load all updates in the applied state until testedC.Perform all software updates in maintenance modeD.Use the Force Overwrite option for filesets that are already committed.
考题
The latest version of a licensed product is already installed. Which of the following methods is most appropriate to load an older version of a licensed program product over the latest version?()
A.Install the older version with a Force Overwrite optionB.An older version cannot be installed if a newer version is installedC.Use the Reject option on the committed newer version that is installedD.Using the lppdiff command, capture the names of the newer filesets for the product, then remove them using this listing as input to the installp command
考题
Examples of types of physical access controls include all EXCEPT which of the following? 以下哪一个选项不属于典型的物理访问控制手段?()A、passwords密码B、guards守卫C、locks锁D、badges徽章
考题
Which of the following is the most costly countermeasure to reducing physical security risks?物理安全风险的防控措施中,下列哪一项成本最高?()A、A .Procedural Controls流程控制B、B. Electronic Systems电子系统C、C .Security Guards安全守卫D、D .Hardware Devices硬件设备
考题
Which of the following management types can be used to deploy appropriate quality-of-servicesolutions to make the most efficient use of bandwidth?()A、Fault managementB、Accounting managementC、Operations managementD、Performance managementE、Security managementF、Configuration management
考题
Which of the following are methods to automatically update the antivirus application?() (Select TWO).A、Establish rules in the email scheduling program to perform updates.B、Select Update Now from the program options.C、Use the Automatic Update feature built into the application.D、Use scripts.E、Use Windows Update.
考题
lisa is writing a formula to determine the number of elements in a list. she wants to ensure that a value is returned, even if the value her function is evaluating turns out to be a null string . which one of the following can she so to accomplish this ?()A、use a defaule formula of 1 B、use @elements and add 1 to the total C、use the @count function instead of @elements D、use @texttotime to ensure that all strings arte converted to date-time values
考题
Which narrative regarding loading software is incorrect?()A、The approved Loading Program could substituted the approved Loading Manual and/or Trim and Stability BookletB、A Loading Program is required to have General Approval by classification Society prior to being considered for use on a specific shipC、Following a satisfactory installation test on board the ship the Surveyor will issue a Program Installation TestD、A Loading Program may be provided as a classification requirement or as an Owner’s option
考题
Which of the following is the BEST approach a technician should take when informing a customerabout their findings of any specific computer problem?()A、Use non-technical terms.B、Use the appropriate acronyms.C、Use proper technical terms.D、Use email to ensure a written record.
考题
Which of the following tools would a technician use to check functionality of a physical networkconnection?()A、Butt setB、Cable testerC、Protocol analyzerD、Voltage event recorder
考题
Which of the following BEST describes the function of a DNS server?()A、Secures network traffic through shared key encryption.B、Provides resolution of host names to IP addresses.C、Provides security for a network through the use of ACLs.D、Dynamically assigns IP addresses for easy client configuration.
考题
Which of the following is the MOST important step in any disaster recovery plan?()A、 Appropriate use of backup media and offsite storageB、 The disaster recovery testing process过程C、 Classifying systems according to operational impactD、 Use appropriate fire suppressant systems
考题
A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()A、WEPB、Port filteringC、WPAD、Longer SSID broadcast intervals
考题
The latest version of a licensed product is already installed. Which of the following methods is most appropriate to load an older version of a licensed program product over the latest version?()A、Install the older version with a Force Overwrite optionB、An older version cannot be installed if a newer version is installedC、Use the Reject option on the committed newer version that is installedD、Using the lppdiff command, capture the names of the newer filesets for the product, then remove them using this listing as input to the installp command
考题
Which of the following procedures is safest perform when updating licensed program products?()A、Load all updates in the commit stateB、Load all updates in the applied state until testedC、Perform all software updates in maintenance modeD、Use the Force Overwrite option for filesets that are already committed.
考题
Which of the following are correct about block media recovery?()A、 Physical and logical block corruption is recorded automatically in V$DATABASE_BLOCK_ CORRUPTIONB、 Logical corruptions are repairable by BMRC、 Physical corruptions are repairable by BMRD、 RMAN can use any backup for a BMR restoreE、 ARCHIVELOG mode is not required if you have both a full and incremental backup for restore
考题
For which of the following can you use Segment Shrink?()A、 Heap tablesB、 Tables with function-based indexesC、 IndexesD、 Partitions and subpartitionsE、 None of the above
考题
Your company uses Windows Update to download and install security updates on client computers. When Microsoft releases a security update, you have the following requirements: Establish which client computers require the security update. Identify what changes will occur as a result of the security update. Identify which applications might be affected by the security update. You need to select the appropriate tool to detect application-compatibility issues. What should you do?()A、Use the Inventory Collector.B、Use the Setup Analysis Tool.C、Use the Update Compatibility Evaluator.D、Use the Windows Compatibility Evaluator.
考题
A software update was installed using the Apply option, however the update is no longer required. Which of the following procedures should be performed to remove the update?()A、Use the Reject optionB、Delete the update form the /usr/lpp directoriesC、Use the Force Overwrite option to re-install the earlier versionD、Commit the update and then remove the updated product filesets using SMIT
考题
单选题Which of the following BEST describes the function of a DNS server?()A
Secures network traffic through shared key encryption.B
Provides resolution of host names to IP addresses.C
Provides security for a network through the use of ACLs.D
Dynamically assigns IP addresses for easy client configuration.
考题
单选题Which of the following is the MOST important step in any disaster recovery plan?()A
Appropriate use of backup media and offsite storageB
The disaster recovery testing process过程C
Classifying systems according to operational impactD
Use appropriate fire suppressant systems
考题
多选题For which of the following can you use Segment Shrink?()AHeap tablesBTables with function-based indexesCIndexesDPartitions and subpartitionsENone of the above
考题
单选题Which of the following is the most costly countermeasure to reducing physical security risks?物理安全风险的防控措施中,下列哪一项成本最高?()A
A .Procedural Controls流程控制B
B. Electronic Systems电子系统C
C .Security Guards安全守卫D
D .Hardware Devices硬件设备
考题
单选题Guards are appropriate whenever the function required by the security program involves which of the following?守卫合适执行安全程序所涉及以下哪一项功能?()A
The use of discriminating judgment使用辨别判断能力的时候B
The use of physical force使用暴力的时候
热门标签
最新试卷