网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Who should DECIDE how a company should approach security and what security measures should be implemented?谁应该决定一个公司应该如何对待安全以及实施什么样的安全措施?()
A

Data owner 数据拥有者

B

Auditor 审计员

C

The information security specialist 信息安全专家

D

Senior management 高级管理者


参考答案

参考解析
解析: 暂无解析
更多 “单选题Who should DECIDE how a company should approach security and what security measures should be implemented?谁应该决定一个公司应该如何对待安全以及实施什么样的安全措施?()A Data owner 数据拥有者B Auditor 审计员C The information security specialist 信息安全专家D Senior management 高级管理者” 相关考题
考题 I wonder______. A、who of them should I electB、who of them I should electC、which of them should I electD、which of them I should elect

考题 When individuals or firms apply for insurance, it is the ___who study the applications, check documents and decide whether the company should take the risk and insure. A.underwritersB.field agentsC.insurance brokersD.claim representative

考题 How should we go through the security check?A.you should wait one by oneB.show your certificate onlyC.put your carry _on baggage on the belt ,which will take it to be sereen bay X-ray equipmentD.you should go through the gate and the staff may give you a personal search

考题 A survival craft being used to pick up a person who has fallen overboard from a ship should approach the person ______.A.at a high rate of speedB.under oarsC.against the windD.with the wind

考题 How do you decide whether a word should enter the students’ active or passive vocabulary?

考题 Who should DECIDE how a company should approach security and what security measures should be implemented?谁应该决定一个公司应该如何对待安全以及实施什么样的安全措施?()A、Data owner 数据拥有者B、Auditor 审计员C、The information security specialist 信息安全专家D、Senior management 高级管理者

考题 Which should be the key driver for a company security policy’s creation, implementation and enforcement?()A、 the business knowledge of the IT staffB、 the technical knowledge of the IT staffC、 the company’s business objectivesD、 the company’s network topologyE、 the IT future directions

考题 Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()A、Network diagramB、Performance baselineC、Network security procedureD、Company policy

考题 Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A、The cell phone should require a password after a set period of inactivity.B、The cell phone should only be used for company related emails.C、The cell phone data should be encrypted according to NIST standards.D、The cell phone should have data connection abilities disabled.

考题 You have a use case in your web application that adds several session-scoped attributes. At the end of theuse case, one of these objects, the manager attribute, is removed and then it needs to decide which of theother session-scoped attributes to remove. How can this goal be accomplished?()A、The object of the manager attribute should implement the HttpSessionBindingListener and it should call the removeAttribute method on the appropriate session attributes.B、The object of the manager attribute should implement the HttpSessionListener and it should call the removeAttribute method on the appropriate session attributes.C、The object of the manager attribute should implement the HttpSessionBindingListener and it should call the deleteAttribute method on the appropriate session attributes.D、The object of the manager attribute should implement the HttpSessionListener and it should call the deleteAttribute method on the appropriate session attributes.

考题 You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()A、Microsoft Baseline Security Analyzer (MBSA)B、Microsoft Security Assessment Tool (MSAT)C、Resultant Set of Policy (RSoP)D、Security Configuration Wizard (SCW)

考题 Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()A、You should consider configuring the sender reputation.B、You should consider configuring the sender filtering.C、You should consider configuring the content filtering.D、You should consider configuring the recipient filtering.

考题 You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently created a distribution group for the network users.During the course of the business week you receive instruction from Company.com to ensure that the newly added users are able to add their mailboxes to the distribution group.What should you do?()A、You should consider having the security settings of the distribution group modified.B、You should consider having the authentication settings of the ECP virtual directory modified.C、You should consider having the group scope of the distribution group modified.D、You should consider having the approval mode of the distribution group modified.

考题 You need to recommend a security strategy for WebApp2 that meets the company’s applicaton  requirements.What should you include in the recommendation?()A、Basic authentication and connection security rulesB、Basic authentication and SSLC、Digest authentication and connection security rulesD、Digest authentication and SSL

考题 填空题It is quite difficult for me (decide) ____ who should be given the job.

考题 单选题You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as the administrator of a SQL Server 2005 computer, and the computer is named SQL1. Microsoft Windows Server 2003 is run by all servers. All the servers belong to a Microsoft Active Directory domain. According to the company written security policy, strong passwords are mandated for all domain, local, and application accounts. The company utilizes a Group Policy object (GPO) to deploy the proper domain password policy. MS-DOS-based or UNIX-based operating systems are run by many of the company’s computers. Varying levels of access to a database named Services on SQL1 is requested by the computers. Since you are the database administrator, you are required to confirm that the Services database can be accessed by these computers. And the company’s written security policy should not be violated.  Which action should be performed by you?()A A domain account should be created for each of the company’s users. And then, each domain account should be offered with access to SQL1 and the Services database.B A local logon account should be created on SQL1 for each of the company’s users. And then, each logon account should be offered with access to SQL1 and the Services database.C One SQL Server logon account should be created for all of the company’s computers running MS-DOS or UNIX-based operating systems. And then, the Enforce password policy option should be enabled for users’ accounts. At last, the logon accounts should be provided with access to the Services database.D A SQL Server logon account should be created for each of the company’s users. And then, the Enforce password policy option should be enabled for each logon account. At last, each logon account should be offered with access to the Services database.E A virtual directory should be configured through Internet Information Services (IIS) for access to SQL1. And then, users should be directed to the virtual directory for data access.

考题 单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is an internal application which uses Analysis Services and Reporting Services. You use the application on the basis of SQL Server 2008. According to the requirement of company security policy, the surface area for all the deployed components of SQL Server 2008 should be configured. You have to implement the security policy and devise a method to evaluate the security policy against other database servers. What should you do?()A You should create policies based on the appropriate facets. Apply the policies against a server group. The server group includes the database servers that need to be configured B You should create a Transact-SQL script based on the sp_configure stored procedure. Use a configuration server to run the script against a server group that includes the database servers that need to be configured C You should edit the RSReportServer.config configuration file. Distribute the file to all database servers that need to be configured D You should analyze your database servers by using the SQL Server Best Practices Analyzer (BPA). Implement the recommendations of the BPA

考题 单选题You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()A Microsoft Baseline Security Analyzer (MBSA)B Microsoft Security Assessment Tool (MSAT)C Resultant Set of Policy (RSoP)D Security Configuration Wizard (SCW)

考题 单选题You are employed as the enterprise exchange administrator at Company.com..com makes use of Microsoft exchange server 2010 messaging solution.you are responsible for managing the exchange network for Company.com.you are experiencing various problems in the exchange environment.you decide to determine whether one of the other administrators executed any configuration changes in the organization.What should you do?()A You should consider running Exchange Best Practices Analyzer.B You should consider running Microsoft Baseline Security Analyzer (MBSA).C You should consider running the Get-ExchangeServer cmdlet.D You should consider running the Get-EventLogLevel cmdlet.

考题 单选题Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A The cell phone should require a password after a set period of inactivity.B The cell phone should only be used for company related emails.C The cell phone data should be encrypted according to NIST standards.D The cell phone should have data connection abilities disabled.

考题 单选题You need to recommend a NAP enforcement method that meets the companyˉs security requirements. Which method should you recommend?()A 802.1XB DHCPC IPSecD VPN

考题 单选题Which should be the key driver for a company security policy’s creation, implementation and enforcement?()A  the business knowledge of the IT staffB  the technical knowledge of the IT staffC  the company’s business objectivesD  the company’s network topologyE  the IT future directions

考题 单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance.You must make sure that all SQL Server instances are consistently configured for naming conventions, security settings, force index creation and avoidance of data fragmentation. So what action should you perform to achieve this goal?()A You should use the Database Engine Tuning Advisor. B In Microsoft SQL Server Management Studio, you should create a maintenance plan C You should use the SQL Server Configuration Manager D In Microsoft SQL Server Management Studio, you should create a policy

考题 问答题How do you decide whether a word should enter the students’ active or passive vocabulary?

考题 单选题A survival craft being used to pick up a person who has fallen overboard from a ship should approach the person().A at a high rate of speedB under oarsC against the windD with the wind

考题 单选题According to the ISPS Code, for a sailing ship, the following except()should be onboard.A a ship security planB a ship security officerC a company security officerD certain onboard equipments

考题 问答题Discuss, and decide together:  ● What the likely reactions from staff might be to the introduction of the scheme?  ● How feedback should be given to staff on their performance?

考题 问答题Some people think that parents should plan their children's leisure time carefully. Others believe that children should decide for themselves how to spend their free time. Which opinion do you agree? Write a composition of about 400 words to state your view.