网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
A bank wants to maximize the security of employee computer data displayed on their screen.Which of the following would BEST accomplish these goals?()
A
Keyboard filters
B
Privacy filters
C
Screensavers
D
Secure display drivers
参考答案
参考解析
解析:
暂无解析
更多 “单选题A bank wants to maximize the security of employee computer data displayed on their screen.Which of the following would BEST accomplish these goals?()A Keyboard filtersB Privacy filtersC ScreensaversD Secure display drivers” 相关考题
考题
What was Peter's job?A.A radio announcer.B.A bank employee.C.A car mechanic.D.A movie actor.
考题
Virus Security Software is designed to detect, eliminate or quarantine computer viruses before they are able to harm a computer or server networked system.A.AntiB.InvadeC.InroadD.Aggression
考题
The central idea of this passage is ______.A.electronic transfer of fundsB.bank's payment mechanismC.clearing of checksD.computer and payment
考题
A user wants to convert their current computer into an audio/video editing workstation byupgrading components. They want to start by upgrading the hard drive. Which of the followinghard drives should be chosen to maximize read/write speed?()A. Zip driveB. 15,000 rpm SATAC. 7,200 rpm IDED. USB flash
考题
A bank wants to maximize the security of employee computer data displayed on their screen.Which of the following would BEST accomplish these goals?()
A. Keyboard filtersB. Privacy filtersC. ScreensaversD. Secure display drivers
考题
Your company has a main office and a branch office. The network contains an Active Directory forest. All users on the network access the Internet from their computers. The company hires a temporary employee who has his own portable computer. The employee connects his portable computer to the network. When the employee attempts to join the computer to the domain, the connection fails. A help desk technician reports the following about the employee. He has a domain user account.His computer can access Internet Web sites.His computer can contact domain controllers by using the domain controllers IP addresses. You need to ensure that the employees computer can join the domain. The solution must ensure that the computer can access resources on the Internet. What should you do?()A.Modify the time zone for the computer.B.Modify the IPv4 settings on the computer.C.Create an A record for the computer in an internal DNS zone.D.Request that an administrator create a prestaged computer account in the domain.
考题
Human resource management is the management of human resources.It is function in organizations designed to maximize employee ( ) in service of an employer's strategic objectives.A.workB.jobC.scopeD.performance
考题
UCLA had taken away all Social Security numbers from common usage to ensure the computer security.
考题
Human resource management is the management of human resources. It is a function in organization designed to maximize employee ( )in service of an employer’s strategic objectives.A.work
B. joB.
C.scope
D.performance
考题
A user wants to convert their current computer into an audio/video editing workstation byupgrading components. They want to start by upgrading the hard drive. Which of the followinghard drives should be chosen to maximize read/write speed?()A、Zip driveB、15,000 rpm SATAC、7,200 rpm IDED、USB flash
考题
You have two computers named Computer1 and Computer2 that run Windows 7. You need to ensure thatComputer2 has exactly the same firewall rules as Computer1. What should you do on Computer1?()A、Run Winrm.exe quickconfig.B、From Windows Firewall with Advanced Security, select Export Policy.C、From Windows Firewall with Advanced Security, click Inbound Rules and then click Export List.D、Open Local Security Policy. Right-click IP Security Policies on Local Computer and then click Export List.
考题
A technician wants to prevent employees from installing software on company computers. In which of the following groups should the employee accounts be placed?()rsA、Power UsersB、UsersC、GuestsD、Administrato
考题
For the following attempts, which one is to ensure that no one employee becomes a pervasive securitythreat, that data can be recovered from backups, and that information system changes do not compromisea system’s security?()A、Strategic security planningB、Disaster recoveryC、Implementation securityD、Operations security
考题
A System p administrator is investigating a possible security breech and wants to review information about failed login attempts to the system. Which of the following commands will show this()A、fwtmp /etc/security/failedloginB、cat /etc/security/failedloginC、whoD、alog -f /etc/security/failedlogin -o
考题
Your company has a main office and a branch office. The network contains an Active Directory forest. All users on the network access the Internet from their computers. The company hires a temporary employee who has his own portable computer. The employee connects his portable computer to the network. When the employee attempts to join the computer to the domain, the connection fails. A help desk technician reports the following about the employee. He has a domain user account.His computer can access Internet Web sites.His computer can contact domain controllers by using the domain controllers IP addresses. You need to ensure that the employees computer can join the domain. The solution must ensure that the computer can access resources on the Internet. What should you do?()A、Modify the time zone for the computer.B、Modify the IPv4 settings on the computer.C、Create an A record for the computer in an internal DNS zone.D、Request that an administrator create a prestaged computer account in the domain.
考题
You have a combined Windows 2000 and Windows 98 network that contain sensitive data. You want to utilize as many new Windows 2000 security features as possible. You want to customize a security policy on each computer to ensure that data is kept confidential and secured. Allcomputers must still be able to communicate with each other over the network. What should you do?()A、Use the security configuration and analysis console to improve the HISECWS security template file.B、Use the local computer policy to disable the access this computer from the network option.C、Use SECEDIT to reconfigure the computer default security settings to not allow anonymous access to the computer.D、Create a policy that excludes write access to the windows 2000 computers then apply the policy to all non-windows 2000 computers.E、None of the above, Windows 9X systems cannot be secured using security template files.
考题
You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()A、Use secedit.exe to refresh the security policy.B、Use the local computer policy to configure the local security policy.C、Use security configuration and analysis to support the security files as a .pol file.D、Use computer management to configure the security policy setting.
考题
You upgrade five computers in the Finance organizational unit (OU) from Windows NT Workstation 4.0 to Windows 2000 Professional. The computers are used by members of the Finance OU to run financial Applications. All five computers are configured to have the default security settings. A user named Helene reports that she can no longer log run the financial applications on her Windows 2000 Professional computer. Prior to the upgrade, Helene was able to run the financial applications on her computer. Helene is a member of the local Users group. You want the financial applications to run on her computer. What should you do?()A、 Use Computer Management to configure separate memory space for each financial application on Helene’s computer.B、 Use Security Templates to edit the Security Policy to include the financial application onHelene’s computer. Then add Helene’s user account to the Power Users group on Helene’s computer.C、 Use Security Configuration and Analysis to reconfigure the default security policy .inf to allow financial applications to run on Helene’s computer.D、 Use Secedit.exe to apply the Compatws.inf security template on Helene’s Security Policy toloosen the permissions for the local Users group on Helene’s computer.
考题
单选题Your company has a main office and a branch office. The network contains an Active Directory forest. All users on the network access the Internet from their computers. The company hires a temporary employee who has his own portable computer. The employee connects his portable computer to the network. When the employee attempts to join the computer to the domain, the connection fails. A help desk technician reports the following about the employee. He has a domain user account.His computer can access Internet Web sites.His computer can contact domain controllers by using the domain controllers IP addresses. You need to ensure that the employees computer can join the domain. The solution must ensure that the computer can access resources on the Internet. What should you do?()A
Modify the time zone for the computer.B
Modify the IPv4 settings on the computer.C
Create an A record for the computer in an internal DNS zone.D
Request that an administrator create a prestaged computer account in the domain.
考题
单选题You upgrade five computers from Windows NT 4.0 Workstation to Windows 2000 Professional. These computers are used by the members of the Finance OU to run financial applications. All five computers are configured to have the default security settings. A User named Helena, reports that she can no longer run the financial Applications on her Windows 2000 Professional computer. Prior to the upgrade, Helena was able to run the applications on her computer. Helena is member of the Local User group. You want the applications to run on her computer. What should you do?()A
Use Computer Management to configure separate memory spaces for each financial application on Helena’s Computer.B
Use Security Templates to edit the Security Policy to include the financial applications on Helena’s Computer. Then add Helena’s user account to the Power User Group on Helena’s Computer.C
Use Security Configuration and Analysis to reconfigure the default security policy .inf file to allow the finance applications to run on Helena’s Computer.D
Use secedit.exe to apply the Compatws.inf security template to Helena’s Security Policy to loose the permission for the Local User group on Helena’s Computer.
考题
单选题You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()A
Use secedit.exe to refresh the security policy.B
Use the local computer policy to configure the local security policy.C
Use security configuration and analysis to support the security files as a .pol file.D
Use computer management to configure the security policy setting.
考题
单选题A
A new computer system was installed.B
Information was entered into the computer system correctly.C
Some employee information got lost.D
Paychecks were distributed for the wrong amount.
考题
单选题You have a combined Windows 2000 and Windows 98 network that contain sensitive data. You want to utilize as many new Windows 2000 security features as possible. You want to customize a security policy on each computer to ensure that data is kept confidential and secured. Allcomputers must still be able to communicate with each other over the network. What should you do?()A
Use the security configuration and analysis console to improve the HISECWS security template file.B
Use the local computer policy to disable the access this computer from the network option.C
Use SECEDIT to reconfigure the computer default security settings to not allow anonymous access to the computer.D
Create a policy that excludes write access to the windows 2000 computers then apply the policy to all non-windows 2000 computers.E
None of the above, Windows 9X systems cannot be secured using security template files.
考题
单选题You have two computers named Computer1 and Computer2 that run Windows 7. You need to ensure thatComputer2 has exactly the same firewall rules as Computer1. What should you do on Computer1?()A
Run Winrm.exe quickconfig.B
From Windows Firewall with Advanced Security, select Export Policy.C
From Windows Firewall with Advanced Security, click Inbound Rules and then click Export List.D
Open Local Security Policy. Right-click IP Security Policies on Local Computer and then click Export List.
考题
单选题A technician wants to prevent employees from installing software on company computers. In which of the following groups should the employee accounts be placed?()rsA
Power UsersB
UsersC
GuestsD
Administrato
考题
单选题A user wants to convert their current computer into an audio/video editing workstation byupgrading components. They want to start by upgrading the hard drive. Which of the followinghard drives should be chosen to maximize read/write speed?()A
Zip driveB
15,000 rpm SATAC
7,200 rpm IDED
USB flash
热门标签
最新试卷