网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
When installing a security system, which of the following connectors would be used to connect the security system to the telephone service demarcation?()
A
RJ-31x
B
RJ-11
C
RS-232
D
DB-9
参考答案
参考解析
解析:
暂无解析
更多 “单选题When installing a security system, which of the following connectors would be used to connect the security system to the telephone service demarcation?()A RJ-31xB RJ-11C RS-232D DB-9” 相关考题
考题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS
考题
Which of the following would be the correct location to access when enabling Driver Signature Verification?()A、On the hardware tab in System Properties.B、In the Security Center applet in Control Panel.C、In Device Manager under the File menu and options.D、In Computer Management.
考题
Which of the following system utilities would be used to change a drive type from dynamic tobasic?()A、System Partition ManagerB、NTBACKUPC、Device ManagerD、Disk Management
考题
A System p administrator has created a customized security profile using AIX Security Expert. Which of the following commands will apply this to a system()A、aixpert -f mysec.xmlB、aixpert -a mysec.xmlC、chsec -f mysec.xmlD、chsec -a mysec.xml
考题
When installing a security system, which of the following connectors would be used to connect the security system to the telephone service demarcation?()A、RJ-31xB、RJ-11C、RS-232D、DB-9
考题
For the following attempts, which one is to ensure that no one employee becomes a pervasive securitythreat, that data can be recovered from backups, and that information system changes do not compromisea system’s security?()A、Strategic security planningB、Disaster recoveryC、Implementation securityD、Operations security
考题
Which of the following connectors would be used if the EIA/TIA 568 scheme is followed?()A、STB、RJ-11C、RJ-45D、MT-RJ
考题
Which of the following is MOST critical when installing a new processor in an existing system?()A、Thermal pasteB、FansC、Drive speedsD、Cable management
考题
A technician is troubleshooting a user’s problem; important Windows services are not starting. In which of the following locations should the technician check to investigate when these services started or stopped?()A、Com+.logB、System LogC、Security LogD、Application Log
考题
Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A、IDSB、VPNC、NIPSD、HIDS
考题
Which of the following connectors is MOST commonly used for UTP cable?()A、RJ-45B、RJ-11C、LCD、SC
考题
Which of the following tools can be used to securely connect to a remote system?()A、RCMDB、SSHC、TELNETD、HTTP
考题
Which of the following would be used to monitor unauthorized access to data files?()A、Performance Log and AlertsB、Event ViewerC、Security Configuration and AnalysisD、IP Security Monitor
考题
A System p administrator is investigating a possible security breech and wants to review information about failed login attempts to the system. Which of the following commands will show this()A、fwtmp /etc/security/failedloginB、cat /etc/security/failedloginC、whoD、alog -f /etc/security/failedlogin -o
考题
A System p administrator needs to set the default password length for all users to six characters. Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user
考题
单选题A System p administrator is investigating a possible security breech and wants to review information about failed login attempts to the system. Which of the following commands will show this()A
fwtmp /etc/security/failedloginB
cat /etc/security/failedloginC
whoD
alog -f /etc/security/failedlogin -o
考题
单选题Which of the following would be the correct location to access when enabling Driver Signature Verification?()A
On the hardware tab in System Properties.B
In the Security Center applet in Control Panel.C
In Device Manager under the File menu and options.D
In Computer Management.
考题
单选题A System p administrator needs to set the default password length for all users to six characters. Which of the following files needs to be edited to accomplish this ()A
/etc/security/limitsB
/etc/security/mkuser.sysC
/etc/security/privD
/etc/security/user
考题
单选题Which of the following tools can be used to securely connect to a remote system?()A
RCMDB
SSHC
TELNETD
HTTP
考题
单选题Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A
HoneynetB
HoneypotC
Vulnerability scannerD
Network based IDS
考题
单选题Which of the following commands would be used to verify the integrity of critical system files?()A
verifyB
nslookupC
sfcD
chkdsk
考题
单选题For the following attempts, which one is to ensure that no one employee becomes a pervasive securitythreat, that data can be recovered from backups, and that information system changes do not compromisea system’s security?()A
Strategic security planningB
Disaster recoveryC
Implementation securityD
Operations security
考题
单选题Which of the following is MOST critical when installing a new processor in an existing system?()A
Thermal pasteB
FansC
Drive speedsD
Cable management
考题
单选题The network technician is troubleshooting a network issue by implementing a new security device.After installing and configuring the device, which of the following steps should the technician takeNEXT?()A
Verity full system functionalityB
Identify the main problem and question the userC
Document their findings, actions, and outcomesD
Escalate the issue to upper management
考题
单选题Which of the following would be used to monitor unauthorized access to data files?()A
Performance Log and AlertsB
Event ViewerC
Security Configuration and AnalysisD
IP Security Monitor
考题
单选题A System p administrator has created a customized security profile using AIX Security Expert. Which of the following commands will apply this to a system()A
aixpert -f mysec.xmlB
aixpert -a mysec.xmlC
chsec -f mysec.xmlD
chsec -a mysec.xml
考题
单选题Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A
IDSB
VPNC
NIPSD
HIDS
热门标签
最新试卷