The security team has implemented new guidelines on how to handle sensitive information storedon workstations based on a past incident involving information found on donated workstations.Which of the following should be completed by technicians before donating the workstations?()
第1题:
While most recent attention in the AI field has been focused on expert system software, AI(66)has also seen dramatic advances. Activity in the past years was characterized by new low-cost, powerful Lisp machines, the introduction of AI workstations, Lisp compilers becoming available for all major professional and engineering workstations, and the personal computer emerging as a(67). tool for expert system development. The next few years will see this technology evolves further.Because the(68)of an AI computer represents a sizable investment, companies should carefully(69)all options that are available as well as have a good idea of what the next generation of systems will offer in order to(70)the optimum system. This publication provides the information necessary to gain this understanding.
A.choice
B.read
C.important
D.software
E.hardware
第2题:
Of the following,______ is not likely found in The Mariners Handbook(NP100).
A.navigational hazards and buoyage,meteorological data,details of pilotage,regulations,port facilities and guides to major port entry
B.information on charts
C.information on operational information and regulation
D.information on tides,currents and characteristics of the sea
第3题:
第4题:
第5题:
The communication management plan determines the information and communications needs of the stakeholders. In the following statements related to communication management plan. ( ) is false.
第6题:
Which of the following is the MOST secure and efficient way to dispose of rewritable DVD media containing sensitive information?()
第7题:
A technician is troubleshooting a workstation that has the wrong time information. All workstations should be pointing to a central NTP server. Which of the following locations would the technician check to investigate error messages related to this issue?()
第8题:
An administrator was asked to log information on possible security breaches on a server. To which file should additional entries be added to capture this information()
第9题:
A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()
第10题:
A technician is servicing the Human Resource director’s computer which contains payroll software and salary information. Which of the following should the technician do to ensure confidentiality of the payroll information?()
第11题:
Data owner 数据拥有者
Auditor 审计员
The information security specialist 信息安全专家
Senior management 高级管理者
第12题:
IIS log
Application log
System log
Security log
第13题:
Your company network has 500 client computers that run Windows 7. Your team consists of 20 desktop support technicians. Two technicians troubleshoot a hardware-related performance issue on a computer. The technicians obtain different results by using their own User Defined Data Collector Sets. You need to create a standardized Data Collector Set on a network share that is accessible to your team. What should you create?()
A.Event Trace Data Collector Set
B.Performance Counter Data Collector Set
C.Performance Counter Alert Data Collector Set
D.System Configuration Information Data Collector Set
第14题:
第15题:
第16题:
第17题:
Your web application uses a simple architecture in which servlets handle requests and then forward to aJSP using a request dispatcher. You need to pass information calculated by the servlet to the JSP;furthermore, that JSP uses a custom tag and must also process this information. This information mustNOT be accessible to any other servlet, JSP or session in the webapp. How can you accomplish this goal?()
第18题:
A technician works in a datacenter that is shared by multiple companies. The technician isconcerned with preventing the theft of proprietary information by other technicians with access to the datacenter. Which of the following is the BEST way to prevent data theft in this scenario?()
第19题:
A technician is sent out to a client’s office to solve an issue involving a machine which has numerous Windows XP service failures upon startup. Which of the following would be the FIRST place to check for information on this?()
第20题:
The pSeries technical specialist has been invited to a briefing on the latest POWER technology as a representative of their team. What should the specialist offer to do upon return from class in order to best prepare the rest of the team for the introduction of the new technology?()
第21题:
Your company network has 500 client computers that run Windows 7. Your team consists of 20 desktop support technicians. Two technicians troubleshoot a hardware-related performance issue on a computer. The technicians obtain different results by using their own User Defined Data Collector Sets. You need to create a standardized Data Collector Set on a network share that is accessible to your team. What should you create?()
第22题:
CREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password'
CREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password',CHECK_POLICY = OFF
CREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password'[HASHED]
CREATE LOGIN [CONTOSO/pentest]FROM WINDOWS CREATE LOGIN [CONTOSO/hacktest]FROM WINDOWS
第23题:
the security of information on the network used to be a worry.
all the data should be stored on the same system.
the company’s computer-based information is well-protected.