网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
A bank wants to maximize the security of employee computer data displayed on their screen.Which of the following would BEST accomplish these goals?()
A
Keyboard filters
B
Privacy filters
C
Screensavers
D
Secure display drivers
参考答案
参考解析
解析:
暂无解析
更多 “单选题A bank wants to maximize the security of employee computer data displayed on their screen.Which of the following would BEST accomplish these goals?()A Keyboard filtersB Privacy filtersC ScreensaversD Secure display drivers” 相关考题
考题
A bank wants to maximize the security of employee computer data displayed on their screen.Which of the following would BEST accomplish these goals?()
A. Keyboard filtersB. Privacy filtersC. ScreensaversD. Secure display drivers
考题
Which of the following commands would be used to display the IP address on a UNIX/Linux computer?()
A.netstatB.ipconfigC.ifconfigD.dig
考题
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption
考题
For security reasons a network technician wants to install a Linux based email server, Microsoftweb services, and directory services on different servers.Which of the following technologies would be BEST to reduce hard ware costs?()A. VPN concentratorB. Virtual serversC. WirelessD. Multimode fiber
考题
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A、WEP encryptionB、Channel rotationC、Disable SSIDD、WPA encryption
考题
A user wants to be permanently added to the dba group. Which of the following commands or processes can be used to accomplish this()A、chgrpB、chuserC、edit /etc/userD、edit /etc/security/group
考题
A bank wants to maximize the security of employee computer data displayed on their screen.Which of the following would BEST accomplish these goals?()A、Keyboard filtersB、Privacy filtersC、ScreensaversD、Secure display drivers
考题
Which of the following devices would allow a technician to utilize a single mouse, keyboard, and display to control numerous desktop PCs?()A、Port replicatorB、Docking stationC、USB hubD、KVM switch
考题
For security reasons a network technician wants to install a Linux based email server, Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hard ware costs?()A、VPN concentratorB、Virtual serversC、WirelessD、Multimode fiber
考题
An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic. Which of the following settings would BEST provide additional monitoring security?()A、Setting up a custom community nameB、Configuring the network to block traffic on port 161C、Configuring the Windows Firewall to block port 161D、Setting SNMP to read only on the devicesE、Installing new MIBs
考题
Which of the following provides the BEST security and accountability for a Data Center?()A、Entry loggingB、Combination locksC、Card keysD、Dead bolts
考题
Which of the following commands would be used to display the IP address on a UNIX/Linux computer?()A、netstatB、ipconfigC、ifconfigD、dig
考题
Which of the following would BEST optimize a computer that is heavily used? ()A、ScandiskB、DefragC、IndexingD、Chkdsk
考题
Which of the following below would BEST optimize Windows XP startup?()A、Remove any unnecessary applications that start with Windows.B、Remove device drivers for unused peripherals.C、Disable the computer’s memory check in BIOS.D、Configure ScanDisk to run at startup.
考题
Which of the following protocols would BEST grant the user secure access to a remote location?()A、VPNB、FTPC、POP3D、DNS
考题
单选题For security reasons a network technician wants to install a Linux based email server, Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hard ware costs?()A
VPN concentratorB
Virtual serversC
WirelessD
Multimode fiber
考题
单选题Which of the following provides the BEST security and accountability for a Data Center?()A
Entry loggingB
Combination locksC
Card keysD
Dead bolts
考题
单选题Which of the following provides the BEST security and accountability for a Data Center?()A
Entry loggingB
Combination locksC
Card keysD
Dead bolts
考题
多选题An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic. Which of the following settings would BEST provide additional monitoring security?()ASetting up a custom community nameBConfiguring the network to block traffic on port 161CConfiguring the Windows Firewall to block port 161DSetting SNMP to read only on the devicesEInstalling new MIBs
考题
单选题Which of the following commands would be used to display the IP address on a UNIX/Linux computer?()A
netstatB
ipconfigC
ifconfigD
dig
考题
单选题A user wants to be permanently added to the dba group. Which of the following commands or processes can be used to accomplish this()A
chgrpB
chuserC
edit /etc/userD
edit /etc/security/group
考题
单选题Which of the following devices would allow a technician to utilize a single mouse, keyboard, and display to control numerous desktop PCs?()A
Port replicatorB
Docking stationC
USB hubD
KVM switch
考题
单选题Which of the following below would BEST optimize Windows XP startup?()A
Remove any unnecessary applications that start with Windows.B
Remove device drivers for unused peripherals.C
Disable the computer’s memory check in BIOS.D
Configure ScanDisk to run at startup.
考题
单选题For the following attempts, which one is to ensure that no one employee becomes a pervasive securitythreat, that data can be recovered from backups, and that information system changes do not compromisea system’s security?()A
Strategic security planningB
Disaster recoveryC
Implementation securityD
Operations security
考题
单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A
WEP encryptionB
Channel rotationC
Disable SSIDD
WPA encryption
考题
单选题Which of the following protocols would BEST grant the user secure access to a remote location?()A
VPNB
FTPC
POP3D
DNS
考题
单选题Which of the following would BEST optimize a computer that is heavily used? ()A
ScandiskB
DefragC
IndexingD
Chkdsk
热门标签
最新试卷