网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
When installing a security system, which of the following connectors would be used to connect the security system to the telephone service demarcation?()
- A、RJ-31x
- B、RJ-11
- C、RS-232
- D、DB-9
参考答案
更多 “When installing a security system, which of the following connectors would be used to connect the security system to the telephone service demarcation?()A、RJ-31xB、RJ-11C、RS-232D、DB-9” 相关考题
考题
Which one of these statements about connecting to the Internet is true?(76)A.You must have a modem to connect to the InternetB.You must have a telephone line to connect to the InternetC.The Internet can be used to connect computers with different ISPD.The Internet can only be used to link computers with same operating system
考题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS
考题
Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()
A.IDSB.VPNC.NIPSD.HIDS
考题
In which service component of the wireless operate phase are incident trends analyzed to identify patterns and systemic conditions?()A、system monitoringB、security administrationC、operations setupD、problem management
考题
Choose the service component in the optimize phase which assesses the wlan system and drives continuous improvements by recommending remediation measures including device configuration optimization, capacity planning, traffic analysis, security assessment, ()and quality issue resolution.A、technology assessmentB、operations assessmentC、security assessmentD、security administrationE、change management
考题
Which of the following would be the correct location to access when enabling Driver Signature Verification?()A、On the hardware tab in System Properties.B、In the Security Center applet in Control Panel.C、In Device Manager under the File menu and options.D、In Computer Management.
考题
Which of the following system utilities would be used to change a drive type from dynamic tobasic?()A、System Partition ManagerB、NTBACKUPC、Device ManagerD、Disk Management
考题
A System p administrator has created a customized security profile using AIX Security Expert. Which of the following commands will apply this to a system()A、aixpert -f mysec.xmlB、aixpert -a mysec.xmlC、chsec -f mysec.xmlD、chsec -a mysec.xml
考题
The network technician is troubleshooting a network issue by implementing a new security device.After installing and configuring the device, which of the following steps should the technician takeNEXT?()A、Verity full system functionalityB、Identify the main problem and question the userC、Document their findings, actions, and outcomesD、Escalate the issue to upper management
考题
In which service component of the wireless operate phase are incident trends analyzed to identifypatterns and systemic conditions?()A、System MonitoringB、Security AdministrationC、Operations SetupD、Problem Management
考题
For the following attempts, which one is to ensure that no one employee becomes a pervasive securitythreat, that data can be recovered from backups, and that information system changes do not compromisea system’s security?()A、Strategic security planningB、Disaster recoveryC、Implementation securityD、Operations security
考题
A technician installed a new application on a Windows XP desktop. When the technician tries to launch the application it crashes. Which of the following can the technician use to troubleshoot the application?()A、System logsB、Security logsC、Application logsD、Application installation logs
考题
Which of the following connectors would be used if the EIA/TIA 568 scheme is followed?()A、STB、RJ-11C、RJ-45D、MT-RJ
考题
Which of the following commands would be used to verify the integrity of critical system files?()A、verifyB、nslookupC、sfcD、chkdsk
考题
Which of the following is MOST critical when installing a new processor in an existing system?()A、Thermal pasteB、FansC、Drive speedsD、Cable management
考题
A technician is troubleshooting a user’s problem; important Windows services are not starting. In which of the following locations should the technician check to investigate when these services started or stopped?()A、Com+.logB、System LogC、Security LogD、Application Log
考题
Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A、IDSB、VPNC、NIPSD、HIDS
考题
Which of the following connectors is MOST commonly used for UTP cable?()A、RJ-45B、RJ-11C、LCD、SC
考题
Which of the following tools can be used to securely connect to a remote system?()A、RCMDB、SSHC、TELNETD、HTTP
考题
An administrator needs to explain to management why updates are needed for the server. Which of the following is the BEST explanation to give?()A、The updates guarantee that the server will work smoothly.B、The updates show management that IT is working diligently.C、The updates address driver and security issues.D、The updates are needed to allow the system monitoring agents to connect to the system.
考题
Which of the following would be used to monitor unauthorized access to data files?()A、Performance Log and AlertsB、Event ViewerC、Security Configuration and AnalysisD、IP Security Monitor
考题
A System p administrator is investigating a possible security breech and wants to review information about failed login attempts to the system. Which of the following commands will show this()A、fwtmp /etc/security/failedloginB、cat /etc/security/failedloginC、whoD、alog -f /etc/security/failedlogin -o
考题
A System p administrator needs to set the default password length for all users to six characters. Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user
考题
单选题Which of the following would be the correct location to access when enabling Driver Signature Verification?()A
On the hardware tab in System Properties.B
In the Security Center applet in Control Panel.C
In Device Manager under the File menu and options.D
In Computer Management.
考题
单选题A System p administrator needs to set the default password length for all users to six characters. Which of the following files needs to be edited to accomplish this ()A
/etc/security/limitsB
/etc/security/mkuser.sysC
/etc/security/privD
/etc/security/user
考题
单选题When installing a security system, which of the following connectors would be used to connect the security system to the telephone service demarcation?()A
RJ-31xB
RJ-11C
RS-232D
DB-9
考题
单选题Which of the following would be used to monitor unauthorized access to data files?()A
Performance Log and AlertsB
Event ViewerC
Security Configuration and AnalysisD
IP Security Monitor
热门标签
最新试卷