网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

When installing a security system, which of the following connectors would be used to connect the security system to the telephone service demarcation?()

  • A、RJ-31x
  • B、RJ-11
  • C、RS-232
  • D、DB-9

参考答案

更多 “When installing a security system, which of the following connectors would be used to connect the security system to the telephone service demarcation?()A、RJ-31xB、RJ-11C、RS-232D、DB-9” 相关考题
考题 Which one of these statements about connecting to the Internet is true?(76)A.You must have a modem to connect to the InternetB.You must have a telephone line to connect to the InternetC.The Internet can be used to connect computers with different ISPD.The Internet can only be used to link computers with same operating system

考题 Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?() A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS

考题 Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?() A.IDSB.VPNC.NIPSD.HIDS

考题 In which service component of the wireless operate phase are incident trends analyzed to identify patterns and systemic conditions?()A、system monitoringB、security administrationC、operations setupD、problem management

考题 Choose the service component in the optimize phase which assesses the wlan system and drives continuous improvements by recommending remediation measures including device configuration optimization, capacity planning, traffic analysis, security assessment, ()and quality issue resolution.A、technology assessmentB、operations assessmentC、security assessmentD、security administrationE、change management

考题 Which of the following would be the correct location to access when enabling Driver Signature Verification?()A、On the hardware tab in System Properties.B、In the Security Center applet in Control Panel.C、In Device Manager under the File menu and options.D、In Computer Management.

考题 Which of the following system utilities would be used to change a drive type from dynamic tobasic?()A、System Partition ManagerB、NTBACKUPC、Device ManagerD、Disk Management

考题 A System p administrator has created a customized security profile using AIX Security Expert.  Which of the following commands will apply this to a system()A、aixpert -f mysec.xmlB、aixpert -a mysec.xmlC、chsec -f mysec.xmlD、chsec -a mysec.xml

考题 The network technician is troubleshooting a network issue by implementing a new security device.After installing and configuring the device, which of the following steps should the technician takeNEXT?()A、Verity full system functionalityB、Identify the main problem and question the userC、Document their findings, actions, and outcomesD、Escalate the issue to upper management

考题 In which service component of the wireless operate phase are incident trends analyzed to identifypatterns and systemic conditions?()A、System MonitoringB、Security AdministrationC、Operations SetupD、Problem Management

考题 For the following attempts, which one is to ensure that no one employee becomes a pervasive securitythreat, that data can be recovered from backups, and that information system changes do not compromisea system’s security?()A、Strategic security planningB、Disaster recoveryC、Implementation securityD、Operations security

考题 A technician installed a new application on a Windows XP desktop. When the technician tries to launch the application it crashes. Which of the following can the technician use to troubleshoot the application?()A、System logsB、Security logsC、Application logsD、Application installation logs

考题 Which of the following connectors would be used if the EIA/TIA 568 scheme is followed?()A、STB、RJ-11C、RJ-45D、MT-RJ

考题 Which of the following commands would be used to verify the integrity of critical system files?()A、verifyB、nslookupC、sfcD、chkdsk

考题 Which of the following is MOST critical when installing a new processor in an existing system?()A、Thermal pasteB、FansC、Drive speedsD、Cable management

考题 A technician is troubleshooting a user’s problem; important Windows services are not starting. In which of the following locations should the technician check to investigate when these services started or stopped?()A、Com+.logB、System LogC、Security LogD、Application Log

考题 Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A、IDSB、VPNC、NIPSD、HIDS

考题 Which of the following connectors is MOST commonly used for UTP cable?()A、RJ-45B、RJ-11C、LCD、SC

考题 Which of the following tools can be used to securely connect to a remote system?()A、RCMDB、SSHC、TELNETD、HTTP

考题 An administrator needs to explain to management why updates are needed for the server. Which of the following is the BEST explanation to give?()A、The updates guarantee that the server will work smoothly.B、The updates show management that IT is working diligently.C、The updates address driver and security issues.D、The updates are needed to allow the system monitoring agents to connect to the system.

考题 Which of the following would be used to monitor unauthorized access to data files?()A、Performance Log and AlertsB、Event ViewerC、Security Configuration and AnalysisD、IP Security Monitor

考题 A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()A、fwtmp  /etc/security/failedloginB、cat /etc/security/failedloginC、whoD、alog -f /etc/security/failedlogin -o

考题 A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user

考题 单选题Which of the following would be the correct location to access when enabling Driver Signature Verification?()A On the hardware tab in System Properties.B In the Security Center applet in Control Panel.C In Device Manager under the File menu and options.D In Computer Management.

考题 单选题A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A /etc/security/limitsB /etc/security/mkuser.sysC /etc/security/privD /etc/security/user

考题 单选题When installing a security system, which of the following connectors would be used to connect the security system to the telephone service demarcation?()A RJ-31xB RJ-11C RS-232D DB-9

考题 单选题Which of the following would be used to monitor unauthorized access to data files?()A Performance Log and AlertsB Event ViewerC Security Configuration and AnalysisD IP Security Monitor