更多“Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examplesof which of the following security types?()A、PhysicalB、LogicalC、SoftwareD、Authentication”相关问题
  • 第1题:

    Examples of types of physical access controls include all EXCEPT which of the following? 以下哪一个选项不属于典型的物理访问控制手段?()

    • A、passwords密码
    • B、guards守卫
    • C、locks锁
    • D、badges徽章

    正确答案:A

  • 第2题:

    Which of the following is a way to protect server operating systems from a short term contractor?()

    • A、Biometric devices
    • B、Limited logon hours
    • C、Mantraps
    • D、Rack doors

    正确答案:B

  • 第3题:

    Which of the following provides the BEST security and accountability for a Data Center?()

    • A、Entry logging
    • B、Combination locks
    • C、Card keys
    • D、Dead bolts

    正确答案:C

  • 第4题:

    Which of the following is the MOST important reason for referencing the HCL?()

    • A、 To ensure that all hardware being used has previously been tested
    • B、 To ensure that all hardware being used has the latest firmware
    • C、 To ensure that all hardware being used is the most energy efficient
    • D、 To ensure that all hardware being used can be upgraded in the future

    正确答案:A

  • 第5题:

    Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()

    • A、Intrusion detection
    • B、Virtualization
    • C、Kiting
    • D、Cloning

    正确答案:B

  • 第6题:

    Which of the following commands identifies all network adapter types that are installed in a machine?()

    • A、lsdev
    • B、lsattr
    • C、ifconfig
    • D、netstat

    正确答案:A

  • 第7题:

    You need to design an authentication strategy for users of portable computers. Your solution must meet business requirements. What should you do?()

    • A、Issue smart cards and smart card readers to all portable computer users. Configure the domain to require smart cards for login and to log off users who remote their smart cards
    • B、Configure the portable computers to connect to only wireless networks that use Wired Equivalent Privacy (WEP). Install digital certificates on all portable computers
    • C、Install computer certificates on all portable computers. Configure all portable computers to respond to requests for IPSec encryption
    • D、Install biometric authentication devices on all portable computers. Configure the Default Domain Policy GPO to require complex passwords for all users

    正确答案:A

  • 第8题:

    单选题
    Which of the following provides the BEST security and accountability for a Data Center?()
    A

     Entry logging

    B

     Combination locks

    C

     Card keys

    D

     Dead bolts


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following ensures the MOST secure access to a server room?()
    A

     ID card readers

    B

     Server rack doors

    C

     Biometric devices

    D

     Locked doors


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    Computer systems consist of two very different types of elements:Hardware,which includes all the physical things that can be touched and(),which tells thehardware how to do.
    A

    Software

    B

    Courseware

    C

    Operatingsystem

    D

    I/Odevices


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    That’s all I’m ______ . A Denny from each of your readers.”
    A

    asking

    B

    writing

    C

    saying

    D

    doing


    正确答案: A
    解析:
    句意:那就是我想要的。Ask要求(某人给某物);其他三个不符合题意。

  • 第12题:

    单选题
    Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examplesof which of the following security types?()
    A

    Physical

    B

    Logical

    C

    Software

    D

    Authentication


    正确答案: C
    解析: 暂无解析

  • 第13题:

    Which of the following processes are likely to be found in a microkernel?()

    • A、Lightweight messaging
    • B、Memory management
    • C、Hardware abstraction
    • D、Host stack
    • E、Process scheduling
    • F、All of the above

    正确答案:F

  • 第14题:

    Which one of the following describes who will be able to see an existing doc that contains a readers field ?()

    • A、only those people listed in the access list
    • B、anyone listed as a reader or above in the acl
    • C、only those people list in the readers field
    • D、anyone list as a reader or above in the acl and who is also list in the readers field

    正确答案:D

  • 第15题:

    Which of the following would be an example of a biometric device?()

    • A、USB security key
    • B、smart card reader
    • C、thumb print reader
    • D、encryption password

    正确答案:C

  • 第16题:

    Which of the following is a multimedia device?()

    • A、Biometric device
    • B、Mouse
    • C、Camcorder
    • D、Infrared scanner

    正确答案:C

  • 第17题:

    Which of the following are types of biometric devices used in server rooms? ()

    • A、 Mantraps
    • B、 Fingerprint scanners
    • C、 CCTV systems
    • D、 Retina scanner
    • E、 Proxy card readers

    正确答案:B,D

  • 第18题:

    You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?()

    • A、Install wireless network cards on all accounting department computers. Select PEAP authentication
    • B、Install user certificates on all accounting department computers. Configure these computers to respond to requests for IPSec encryption
    • C、Issue smart cards and smart card readers to all accounting department users and computers. Require NTLMv2 authentication
    • D、Issue smart cards and smart card readers to all accounting department users and computers. Configure the domain to require smart cards for the accounting department users during logon

    正确答案:D

  • 第19题:

    Which of the following ensures the MOST secure access to a server room?()

    • A、 ID card readers
    • B、 Server rack doors
    • C、 Biometric devices
    • D、 Locked doors

    正确答案:C

  • 第20题:

    单选题
    Which of the following is a way to protect server operating systems from a short term contractor?()
    A

     Biometric devices

    B

     Limited logon hours

    C

     Mantraps

    D

     Rack doors


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    A

    gives meaning to readers' life

    B

    makes readers blessed with wisdom

    C

    puts readers in a peaceful state of mind

    D

    enables readers to have a sense of belonging


    正确答案: B
    解析:

  • 第22题:

    单选题
    Which of the following is the MOST important reason for referencing the HCL?()
    A

     To ensure that all hardware being used has previously been tested

    B

     To ensure that all hardware being used has the latest firmware

    C

     To ensure that all hardware being used is the most energy efficient

    D

     To ensure that all hardware being used can be upgraded in the future


    正确答案: B
    解析: 暂无解析

  • 第23题:

    多选题
    Which of the following are types of biometric devices used in server rooms? ()
    A

    Mantraps

    B

    Fingerprint scanners

    C

    CCTV systems

    D

    Retina scanner

    E

    Proxy card readers


    正确答案: D,B
    解析: 暂无解析