play an important role in arresting terrorists before they take action
have cost the U.S. Department of Homeland Security more than $ 40 million so far
are mainly deployed near Washington
work better than they have been expected to
第1题:
此题为判断题(对,错)。
第2题:
Who should measure the effectiveness of Information System security related controls in an organization?在一个组织内,谁应该衡量信息系统安全相关控制的有效性?()
第3题:
What host-based IPS solution provides threat-protection capabilities for server and desktop computing systems?()
第4题:
Which of these is a benefit of an integrated security management system? ()
第5题:
Which of the following procedure should be performed prior to delivery and generally involves running a suite of operations so as to verify that the solution is applicable for production?()
第6题:
Which must bear the primary responsibility for determining the level of protection needed for information systems resources?哪一个角色必须承担决定信息系统资源保护级别的主要责任?()
第7题:
You have a combined Windows 2000 and Windows 98 network that contain sensitive data. You want to utilize as many new Windows 2000 security features as possible. You want to customize a security policy on each computer to ensure that data is kept confidential and secured. Allcomputers must still be able to communicate with each other over the network. What should you do?()
第8题:
It provides configuration, monitoring, and troubleshooting capabilities across a wide range of security products.
It integrates security device management products and collects events on an as needed basis to reduce management overhead.
It integrates security management capabilities into the router or switch.
It provides a single point of contact for all security configuration tasks thereby enhancing the return on investment.
It leverages existing network management systems such as HP OpenView to lower the cost of implementation.
第9题:
Cisco Trust Agent
Cisco Self-Defending Network
Cisco Secure Access Control
Cisco Network Admission Control
第10题:
project kickoff,staging,systems acceptance testing,ongoing support handoff meeting
wlan change management,security administration,technology assessment,operations plan
security assessment,operations assessment,supplier management
operations readiness assessment,systems requirements validation,planning project kickoff,service assurance
第11题:
A .Procedural Controls流程控制
B. Electronic Systems电子系统
C .Security Guards安全守卫
D .Hardware Devices硬件设备
第12题:
The local security specialist本地安全专家
The systems auditor系统审计师
The central security manager中心安全经理
The business manager业务经理
第13题:
此题为判断题(对,错)。
第14题:
Which of the following wireless service components occur in the implement phase?()
第15题:
Because of the systems-level approach, Cisco security can defend against widespread attacks from hackers and viruses. What describes the Cisco network security strategy?()
第16题:
Which benefit does digital subscriber line (DSL) systems for broadband access provide to the user?()
第17题:
It is a violation of the "separation of duties" principle when which of the fol-lowing individuals access the software on systems implementing security? 下列哪项个人访问对系统安全软件,是违反了“职责分离原则?()
第18题:
You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()
第19题:
A
B
C
D
第20题:
第21题:
Configure all client computers to use Automatic Updates to obtain security patches from the Windows Update Web site. Test and install all patches
Configure a batch file to download security patches daily. Distribute the security patches by using a.zap file and the Default Domain Policy Group Policy object (GPO)
Deploy a Software Update Services (SUS) server. Test all security patches and then approve them. Configure all client computers to automatically obtain updates from the server
Configure a batch file to download security patches daily. Manually install the security patches on all computers
第22题:
Cisco IPS AIM
Cisco IOS IPS
Cisco IPS NME
Cisco Security Agent
Cisco IDSM-2
第23题:
play an important role in arresting terrorists before they take action
have cost the U.S. Department of Homeland Security more than $ 40 million so far
are mainly deployed near Washington
work better than they have been expected to
第24题:
IS security specialists IS安全专家
Senior Management高级管理层
Senior security analysts高级安全分析师
systems Auditors系统审计师