单选题When installing a security system, which of the following connectors would be used to connect the security system to the telephone service demarcation?()A RJ-31xB RJ-11C RS-232D DB-9

题目
单选题
When installing a security system, which of the following connectors would be used to connect the security system to the telephone service demarcation?()
A

RJ-31x

B

RJ-11

C

RS-232

D

DB-9


相似考题
更多“单选题When installing a security system, which of the following connectors would be used to connect the security system to the telephone service demarcation?()A RJ-31xB RJ-11C RS-232D DB-9”相关问题
  • 第1题:

    When installing a security system, which of the following connectors would be used to connect the security system to the telephone service demarcation?()

    • A、RJ-31x
    • B、RJ-11
    • C、RS-232
    • D、DB-9

    正确答案:A

  • 第2题:

    Which of the following connectors would be used if the EIA/TIA 568 scheme is followed?()

    • A、ST
    • B、RJ-11
    • C、RJ-45
    • D、MT-RJ

    正确答案:C

  • 第3题:

    A technician is troubleshooting a user’s problem; important Windows services are not starting. In which of the following locations should the technician check to investigate when these services started or stopped?()

    • A、Com+.log
    • B、System Log
    • C、Security Log
    • D、Application Log

    正确答案:B

  • 第4题:

    Which of the following connectors is MOST commonly used for UTP cable?()

    • A、RJ-45
    • B、RJ-11
    • C、LC
    • D、SC

    正确答案:A

  • 第5题:

    Which of the following would be used to monitor unauthorized access to data files?()

    • A、Performance Log and Alerts
    • B、Event Viewer
    • C、Security Configuration and Analysis
    • D、IP Security Monitor

    正确答案:B

  • 第6题:

    A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()

    • A、/etc/security/limits
    • B、/etc/security/mkuser.sys
    • C、/etc/security/priv
    • D、/etc/security/user

    正确答案:D

  • 第7题:

    单选题
    Which of the following would be the correct location to access when enabling Driver Signature Verification?()
    A

    On the hardware tab in System Properties.

    B

    In the Security Center applet in Control Panel.

    C

    In Device Manager under the File menu and options.

    D

    In Computer Management.


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    Which of the following tools can be used to securely connect to a remote system?()
    A

    RCMD

    B

    SSH

    C

    TELNET

    D

    HTTP


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following commands would be used to verify the integrity of critical system files?()
    A

    verify

    B

    nslookup

    C

    sfc

    D

    chkdsk


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    Which of the following is MOST critical when installing a new processor in an existing system?()
    A

    Thermal paste

    B

    Fans

    C

    Drive speeds

    D

    Cable management


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    The network technician is troubleshooting a network issue by implementing a new security device.After installing and configuring the device, which of the following steps should the technician takeNEXT?()
    A

    Verity full system functionality

    B

    Identify the main problem and question the user

    C

    Document their findings, actions, and outcomes

    D

    Escalate the issue to upper management


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    A System p administrator has created a customized security profile using AIX Security Expert.  Which of the following commands will apply this to a system()
    A

    aixpert -f mysec.xml

    B

    aixpert -a mysec.xml

    C

    chsec -f mysec.xml

    D

    chsec -a mysec.xml


    正确答案: C
    解析: 暂无解析

  • 第13题:

    For the following attempts, which one is to ensure that no one employee becomes a pervasive securitythreat, that data can be recovered from backups, and that information system changes do not compromisea system’s security?()

    • A、Strategic security planning
    • B、Disaster recovery
    • C、Implementation security
    • D、Operations security

    正确答案:D

  • 第14题:

    Which of the following is MOST critical when installing a new processor in an existing system?()

    • A、Thermal paste
    • B、Fans
    • C、Drive speeds
    • D、Cable management

    正确答案:A

  • 第15题:

    Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()

    • A、IDS
    • B、VPN
    • C、NIPS
    • D、HIDS

    正确答案:C

  • 第16题:

    Which of the following tools can be used to securely connect to a remote system?()

    • A、RCMD
    • B、SSH
    • C、TELNET
    • D、HTTP

    正确答案:B

  • 第17题:

    A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()

    • A、fwtmp < /etc/security/failedlogin
    • B、cat /etc/security/failedlogin
    • C、who
    • D、alog -f /etc/security/failedlogin -o

    正确答案:A

  • 第18题:

    单选题
    A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()
    A

    fwtmp < /etc/security/failedlogin

    B

    cat /etc/security/failedlogin

    C

    who

    D

    alog -f /etc/security/failedlogin -o


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()
    A

    /etc/security/limits

    B

    /etc/security/mkuser.sys

    C

    /etc/security/priv

    D

    /etc/security/user


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
    A

    Honeynet

    B

    Honeypot

    C

    Vulnerability scanner

    D

    Network based IDS


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    For the following attempts, which one is to ensure that no one employee becomes a pervasive securitythreat, that data can be recovered from backups, and that information system changes do not compromisea system’s security?()
    A

    Strategic security planning

    B

    Disaster recovery

    C

    Implementation security

    D

    Operations security


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    When installing a security system, which of the following connectors would be used to connect the security system to the telephone service demarcation?()
    A

    RJ-31x

    B

    RJ-11

    C

    RS-232

    D

    DB-9


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following would be used to monitor unauthorized access to data files?()
    A

    Performance Log and Alerts

    B

    Event Viewer

    C

    Security Configuration and Analysis

    D

    IP Security Monitor


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()
    A

    IDS

    B

    VPN

    C

    NIPS

    D

    HIDS


    正确答案: A
    解析: 暂无解析