网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A bank wants to maximize the security of employee computer data displayed on their screen.Which of the following would BEST accomplish these goals?()
A

Keyboard filters

B

Privacy filters

C

Screensavers

D

Secure display drivers


参考答案

参考解析
解析: 暂无解析
更多 “单选题A bank wants to maximize the security of employee computer data displayed on their screen.Which of the following would BEST accomplish these goals?()A Keyboard filtersB Privacy filtersC ScreensaversD Secure display drivers” 相关考题
考题 What was Peter's job?A.A radio announcer.B.A bank employee.C.A car mechanic.D.A movie actor.

考题 Virus Security Software is designed to detect, eliminate or quarantine computer viruses before they are able to harm a computer or server networked system.A.AntiB.InvadeC.InroadD.Aggression

考题 The central idea of this passage is ______.A.electronic transfer of fundsB.bank's payment mechanismC.clearing of checksD.computer and payment

考题 A user wants to convert their current computer into an audio/video editing workstation byupgrading components. They want to start by upgrading the hard drive. Which of the followinghard drives should be chosen to maximize read/write speed?()A. Zip driveB. 15,000 rpm SATAC. 7,200 rpm IDED. USB flash

考题 A bank wants to maximize the security of employee computer data displayed on their screen.Which of the following would BEST accomplish these goals?() A. Keyboard filtersB. Privacy filtersC. ScreensaversD. Secure display drivers

考题 Your company has a main office and a branch office. The network contains an Active Directory forest. All users on the network access the Internet from their computers. The company hires a temporary employee who has his own portable computer. The employee connects his portable computer to the network. When the employee attempts to join the computer to the domain, the connection fails. A help desk technician reports the following about the employee. He has a domain user account.His computer can access Internet Web sites.His computer can contact domain controllers by using the domain controllers IP addresses. You need to ensure that the employees computer can join the domain. The solution must ensure that the computer can access resources on the Internet. What should you do?()A.Modify the time zone for the computer.B.Modify the IPv4 settings on the computer.C.Create an A record for the computer in an internal DNS zone.D.Request that an administrator create a prestaged computer account in the domain.

考题 Human resource management is the management of human resources.It is function in organizations designed to maximize employee ( ) in service of an employer's strategic objectives.A.workB.jobC.scopeD.performance

考题 UCLA had taken away all Social Security numbers from common usage to ensure the computer security.

考题 Human resource management is the management of human resources. It is a function in organization designed to maximize employee ( )in service of an employer’s strategic objectives.A.work B. joB. C.scope D.performance

考题 A user wants to convert their current computer into an audio/video editing workstation byupgrading components. They want to start by upgrading the hard drive. Which of the followinghard drives should be chosen to maximize read/write speed?()A、Zip driveB、15,000 rpm SATAC、7,200 rpm IDED、USB flash

考题 You have two computers named Computer1 and Computer2 that run Windows 7. You need to ensure thatComputer2 has exactly the same firewall rules as Computer1.  What should you do on Computer1?()A、Run Winrm.exe quickconfig.B、From Windows Firewall with Advanced Security, select Export Policy.C、From Windows Firewall with Advanced Security, click Inbound Rules and then click Export List.D、Open Local Security Policy. Right-click IP Security Policies on Local Computer and then click Export List.

考题 A technician wants to prevent employees from installing software on company computers. In which of the following groups should the employee accounts be placed?()rsA、Power UsersB、UsersC、GuestsD、Administrato

考题 For the following attempts, which one is to ensure that no one employee becomes a pervasive securitythreat, that data can be recovered from backups, and that information system changes do not compromisea system’s security?()A、Strategic security planningB、Disaster recoveryC、Implementation securityD、Operations security

考题 A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()A、fwtmp  /etc/security/failedloginB、cat /etc/security/failedloginC、whoD、alog -f /etc/security/failedlogin -o

考题 Your company has a main office and a branch office. The network contains an Active Directory forest. All users on the network access the Internet from their computers. The company hires a temporary employee who has his own portable computer. The employee connects his portable computer to the network. When the employee attempts to join the computer to the domain, the connection fails. A help desk technician reports the following about the employee. He has a domain user account.His computer can access Internet Web sites.His computer can contact domain controllers by using the domain controllers IP addresses. You need to ensure that the employees computer can join the domain. The solution must ensure that the computer can access resources on the Internet. What should you do?()A、Modify the time zone for the computer.B、Modify the IPv4 settings on the computer.C、Create an A record for the computer in an internal DNS zone.D、Request that an administrator create a prestaged computer account in the domain.

考题 You have a combined Windows 2000 and Windows 98 network that contain sensitive data. You want to utilize as many new Windows 2000 security features as possible. You want to customize a security policy on each computer to ensure that data is kept confidential and secured. Allcomputers must still be able to communicate with each other over the network. What should you do?()A、Use the security configuration and analysis console to improve the HISECWS security  template file.B、Use the local computer policy to disable the access this computer from the network option.C、Use SECEDIT to reconfigure the computer default security settings to not allow anonymous  access to the computer.D、Create a policy that excludes write access to the windows 2000 computers then apply the  policy to all non-windows 2000 computers.E、None of the above, Windows 9X systems cannot be secured using security template files.

考题 You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()A、Use secedit.exe to refresh the security policy.B、Use the local computer policy to configure the local security policy.C、Use security configuration and analysis to support the security files as a .pol file.D、Use computer management to configure the security policy setting.

考题 You upgrade five computers in the Finance organizational unit (OU) from Windows NT Workstation 4.0 to Windows 2000 Professional. The computers are used by members of the Finance OU to run financial Applications. All five computers are configured to have the default security settings. A user named Helene reports that she can no longer log run the financial applications on her Windows 2000 Professional computer. Prior to the upgrade, Helene was able to run the financial applications on her computer. Helene is a member of the local Users group. You want the financial applications to run on her computer. What should you do?()A、 Use Computer Management to configure separate memory space for each financial application on Helene’s computer.B、 Use Security Templates to edit the Security Policy to include the financial application onHelene’s computer. Then add Helene’s user account to the Power Users group on Helene’s computer.C、 Use Security Configuration and Analysis to reconfigure the default security policy .inf to allow financial  applications to run on Helene’s computer.D、 Use Secedit.exe to apply the Compatws.inf security template on Helene’s Security Policy toloosen the permissions for the local Users group on Helene’s computer.

考题 单选题Your company has a main office and a branch office. The network contains an Active Directory forest. All users on the network access the Internet from their computers. The company hires a temporary employee who has his own portable computer. The employee connects his portable computer to the network. When the employee attempts to join the computer to the domain, the connection fails. A help desk technician reports the following about the employee. He has a domain user account.His computer can access Internet Web sites.His computer can contact domain controllers by using the domain controllers IP addresses. You need to ensure that the employees computer can join the domain. The solution must ensure that the computer can access resources on the Internet. What should you do?()A Modify the time zone for the computer.B Modify the IPv4 settings on the computer.C Create an A record for the computer in an internal DNS zone.D Request that an administrator create a prestaged computer account in the domain.

考题 单选题You upgrade five computers from Windows NT 4.0 Workstation to Windows 2000 Professional. These computers are used by the members of the Finance OU to run financial applications. All five computers are configured to have the default security settings. A User named Helena, reports that she can no longer run the financial Applications on her Windows 2000 Professional computer. Prior to the upgrade, Helena was able to run the applications on her computer. Helena is member of the Local User group. You want the applications to run on her computer. What should you do?()A Use Computer Management to configure separate memory spaces for each financial  application on Helena’s Computer.B Use Security Templates to edit the Security Policy to include the financial applications on  Helena’s Computer. Then add Helena’s user account to the Power User Group on Helena’s Computer.C Use Security Configuration and Analysis to reconfigure the default security policy .inf file to  allow the finance applications to run on Helena’s Computer.D Use secedit.exe to apply the Compatws.inf security template to Helena’s Security Policy to  loose the permission for the Local User group on Helena’s Computer.

考题 单选题A A radio announcerB A bank employee.C A car mechanic.D A movie actor.

考题 单选题You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()A Use secedit.exe to refresh the security policy.B Use the local computer policy to configure the local security policy.C Use security configuration and analysis to support the security files as a .pol file.D Use computer management to configure the security policy setting.

考题 单选题A A new computer system was installed.B Information was entered into the computer system correctly.C Some employee information got lost.D Paychecks were distributed for the wrong amount.

考题 单选题You have a combined Windows 2000 and Windows 98 network that contain sensitive data. You want to utilize as many new Windows 2000 security features as possible. You want to customize a security policy on each computer to ensure that data is kept confidential and secured. Allcomputers must still be able to communicate with each other over the network. What should you do?()A Use the security configuration and analysis console to improve the HISECWS security  template file.B Use the local computer policy to disable the access this computer from the network option.C Use SECEDIT to reconfigure the computer default security settings to not allow anonymous  access to the computer.D Create a policy that excludes write access to the windows 2000 computers then apply the  policy to all non-windows 2000 computers.E None of the above, Windows 9X systems cannot be secured using security template files.

考题 单选题You have two computers named Computer1 and Computer2 that run Windows 7. You need to ensure thatComputer2 has exactly the same firewall rules as Computer1.  What should you do on Computer1?()A Run Winrm.exe quickconfig.B From Windows Firewall with Advanced Security, select Export Policy.C From Windows Firewall with Advanced Security, click Inbound Rules and then click Export List.D Open Local Security Policy. Right-click IP Security Policies on Local Computer and then click Export List.

考题 单选题A technician wants to prevent employees from installing software on company computers. In which of the following groups should the employee accounts be placed?()rsA Power UsersB UsersC GuestsD Administrato

考题 单选题A user wants to convert their current computer into an audio/video editing workstation byupgrading components. They want to start by upgrading the hard drive. Which of the followinghard drives should be chosen to maximize read/write speed?()A Zip driveB 15,000 rpm SATAC 7,200 rpm IDED USB flash