网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A deviation from an organization-wide security policy requires which of the following?从组织范围的安全策略偏离需要下列哪项?()
A

Risk Reduction降低风险

B

Risk Containment风险控制

C

Risk acceptance风险接受

D

Risk Assignment风险分配


参考答案

参考解析
解析: 暂无解析
更多 “单选题A deviation from an organization-wide security policy requires which of the following?从组织范围的安全策略偏离需要下列哪项?()A Risk Reduction降低风险B Risk Containment风险控制C Risk acceptance风险接受D Risk Assignment风险分配” 相关考题
考题 Your network contains an Active Directory domain. All client computers run Windows XP Service Pack 3 (SP3). The domain contains a member server named Server1 that runs Windows Server 2008 R2. On Server1, you create a connection security rule that requires authentication for inbound and outbound connections. You configure the connection security rule to use Kerberos authentication. You need to ensure that the client computers can connect to Server1. The solution must ensure that all connections to Server1 are encrypted. What should you do?()A. From the Windows Firewall with Advanced Security console, create an inbound rule on Server1.B. From the Windows Firewall with Advanced Security console, create an outbound rule on Server1.C. From a Group Policy object (GPO), enable the Client (Respond Only) IPSec policy on all client computers.D. From a Group Policy object (GPO), configure the Network Security: LDAP client signing requirements policy setting for all client computers.

考题 Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 hosts a custom application named App1. App1 is accessible on TCP port 5000.You need to encrypt App1 data on the network.What should you do?()A. From the Local Security Policy console, configure the Security Options.B. From the Local Security Policy console, configure the Application Control Policies.C. From the Windows Firewall with Advanced Security console, create an inbound rule.D. From the Windows Firewall with Advanced Security console, create a connection security rule.

考题 Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.) A. Traffic is permitted from the trust zone to the untrust zone.B. Intrazone traffic in the trust zone is permitted.C. All traffic through the device is denied.D. The policy is matched only when no other matching policies are found.

考题 The implied condition(s) with respect to the doctrine of deviation in a marine insurance policy is(are) ______.A.that the cargo be discharged from the vessel with customary dispatchB.that the voyage be commenced in a reasonable timeC.that the voyage be pursued over the usual and direct routeD.All of the above

考题 What are two important approaches to communicate when identifying a customer’s security risks? (Choose two.) ()A、 Smaller companies are at less risk than larger enterprises, so their security needs are not as great.B、 Business strategy should directly relate to the security policy and budget.C、 The designated security expert should report to the IT department, since that is where thesolution will be implemented.D、 Security should be a continuous process.E、 Security solutions should come from multiple vendors to make it easier to coordinate security events from the point of origin.

考题 You have two computers named Computer1 and Computer2 that run Windows 7. You need to ensure thatComputer2 has exactly the same firewall rules as Computer1.  What should you do on Computer1?()A、Run Winrm.exe quickconfig.B、From Windows Firewall with Advanced Security, select Export Policy.C、From Windows Firewall with Advanced Security, click Inbound Rules and then click Export List.D、Open Local Security Policy. Right-click IP Security Policies on Local Computer and then click Export List.

考题 You have created a security policy on an SRX240 that permits traffic from any source-address, any destination-address, and any application. The policy will be a source IP policy for use with the Junos Pulse Access Control Service. What must you add to complete the security policy configuration?()A、The intranet-auth authentication optionB、The redirect-portal application serviceC、The uac-policy application serviceD、The ipsec-vpn tunnel

考题 Which statement describes the behavior of a security policy?()A、The implicit default security policy permits all traffic.B、Traffic destined to the device itself always requires a security policy.C、Traffic destined to the device’s incoming interface does not require a security policy.D、The factory-default configuration permits all traffic from all interfaces.

考题 Your network consists of a single Active Directory domain. The functional level of the forest is Windows Server 2008 R2.   You need to create multiple password policies for users in your domain.   What should you do()A、From the Active Directory Schema snap-in, create multiple class schema objects.B、From the ADSI Edit snap-in, create multiple Password Setting objects.C、From the Security Configuration Wizard, create multiple security policies.D、From the Group Policy Management snap-in, create multiple Group Policy objects.

考题 You have a computer that runs Windows 7. You need to record when an incoming connection is allowedthrough Windows firewall. What should you do?()A、In Local Group Policy, modify the audit policy.B、In Local Group Policy, modify the system audit policy.C、From the Windows Firewall with Advanced Security properties, set the logging settings to Log successfulconnections.D、From the Windows Firewall with Advanced Security properties, set the Data Protection (Quick Mode)IPSec settings to Advanced.

考题 When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()A、Third-party due diligence policy reviewB、Remote Access PolicyC、Encryption PolicyD、Application change control policyE、Security Personnel policy

考题 Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)A、Traffic is permitted from the trust zone to the untrust zone.B、Intrazone traffic in the trust zone is permitted.C、All traffic through the device is denied.D、The policy is matched only when no other matching policies are found.

考题 You have a portable computer that runs Windows 7. The computer is joined to a domain. Multiple users logon to the computer. You need to prevent the computer from displaying the username of the last user whologged on. What should you do?()A、From Control Panel, modify the User Profiles settings.B、From Control Panel, modify the Personalization settings.C、From the local computer policy, add a policy template.D、From the local computer policy, modify the local security policy.

考题 You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()A、Use Security Templates to correct the setting and export the security file.B、Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.C、Use Secedit /RefreshPolicy Machine_Policy command.D、Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.

考题 Your network consists of a single Active Directory domain. The domain contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Your company’s security policy states that domain users must be prevented from logging on to Server1 if a domain controller is unavailable. You disconnect Server1 from the network and discover that you can log on to Server1. You need to configure Server1 to comply with the company’s security policy. What should you do on Server1? ()A、From the local security policy, modify the Security Options.B、From the local security policy, modify the User Rights Assignment.C、From Active Directory Users and Computers, modify the properties of the Server1 account.D、From Active Directory Users and Computers, modify the properties of the Domain Computers group.

考题 You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()A、Use secedit.exe to refresh the security policy.B、Use the local computer policy to configure the local security policy.C、Use security configuration and analysis to support the security files as a .pol file.D、Use computer management to configure the security policy setting.

考题 Your network consists of a single Active Directory domain. The functional level of the forest is Windows Server 2008. You need to create multiple password policies for users in your domain. What should you do()A、From the Schema snap-in, create multiple class schema objects.B、From the ADSI Edit snap-in, create multiple Password Setting objects.C、From the Security Configuration Wizard, create multiple security policies.D、From the Group Policy Management snap-in, create multiple Group Policy objects.

考题 多选题When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()AThird-party due diligence policy reviewBRemote Access PolicyCEncryption PolicyDApplication change control policyESecurity Personnel policy

考题 单选题You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails.Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?()A set security policies from-zone dmz to-zone untrust policy anti-spam then permit application- services utm-policy Block-SpamB set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services utm-policy Block-SpamC set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services anti-spam-policyD set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services Block-Spam

考题 单选题Click the Exhibit button. Based on the exhibit, client PC 192.168.10.10 cannot ping 1.1.1.2. Which is a potential cause for this problem?()A The untrust zone does not have a management policy configured.B The trust zone does not have ping enabled as host-inbound-traffic service.C The security policy from the trust zone to the untrust zone does not permit ping.D No security policy exists for the ICMP reply packet from the untrust zone to the trust zone.

考题 单选题You have created a security policy on an SRX240 that permits traffic from any source-address, any destination-address, and any application. The policy will be a source IP policy for use with the Junos Pulse Access Control Service. What must you add to complete the security policy configuration?()A The intranet-auth authentication optionB The redirect-portal application serviceC The uac-policy application serviceD The ipsec-vpn tunnel

考题 单选题Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()A Source IP and browserB Source IP and certificateC Certificate and Host CheckerD Host Checker and source IP

考题 单选题Which configuration shows the correct application of a security policy scheduler?()A [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn myTunnel; } scheduler-name now; } } }B [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn myTunnel; } } } scheduler-name now; }C [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn scheduler-name now; } } } }D [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; scheduler-name now; } then { permit { tunnel { ipsec-vpn myTunnel; } } } scheduler-name now; }myTunnel;

考题 单选题Which statement describes the behavior of a security policy?()A The implicit default security policy permits all traffic.B Traffic destined to the device itself always requires a security policy.C Traffic destined to the device’s incoming interface does not require a security policy.D The factory-default configuration permits all traffic from all interfaces.

考题 单选题You need to configure Active Directory to implement the new password policy for the HR department. What should you do?()A Create a new child domain named hr.ad.margiestravel.com in the existing forest. Move the resources from the HR OU to this new domain. Add the appropriate security settings in the Default Domain Policy for this new domain.B Add the appropriate security settings to the current Default Domain Policy.C Add the appropriate security settings to the local security policy of SQL1.D Set the SQL server check_policy and check_expiration options to On when creating all user accounts.

考题 单选题You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()A Log on to a domain controller and run the Resultant Set of Policy wizard in planning mode on the IIS server computer accountB Run the Microsoft Baseline Security Analyzer (MBSA) on the IIS server and scan for vulnerabilities in Windows and IIS checksC Run Security Configuration and Analysis to analyze the IIS server’s security settings by using a custom security templateD On the IIS server, run the gpresult command from a command prompt and analyze the output

考题 单选题The implied condition(s) with respect to the doctrine of deviation in a marine insurance policy is(are)().A that the cargo be discharged from the vessel with customary dispatchB that the voyage be commenced in a reasonable timeC that the voyage be pursued over the usual and direct routeD All of the above