The security team has implemented new guidelines on how to handle sensitive information storedon workstations based on a past incident involving information found on donated workstations.Which of the following should be completed by technicians before don

题目

The security team has implemented new guidelines on how to handle sensitive information storedon workstations based on a past incident involving information found on donated workstations.Which of the following should be completed by technicians before donating the workstations?()

  • A、Install a new operating system
  • B、Delete users’ data before donation
  • C、Write the drive with 1’s and 0’s three times
  • D、Delete all partitions of the hard drive

相似考题
更多“The security team has implemented new guidelines on how to handle sensitive information storedon workstations based on a past incident involving information found on donated workstations.Which of the following should be completed by technicians before don”相关问题
  • 第1题:

    While most recent attention in the AI field has been focused on expert system software, AI(66)has also seen dramatic advances. Activity in the past years was characterized by new low-cost, powerful Lisp machines, the introduction of AI workstations, Lisp compilers becoming available for all major professional and engineering workstations, and the personal computer emerging as a(67). tool for expert system development. The next few years will see this technology evolves further.Because the(68)of an AI computer represents a sizable investment, companies should carefully(69)all options that are available as well as have a good idea of what the next generation of systems will offer in order to(70)the optimum system. This publication provides the information necessary to gain this understanding.

    A.choice

    B.read

    C.important

    D.software

    E.hardware


    正确答案:E

  • 第2题:

    Of the following,______ is not likely found in The Mariners Handbook(NP100).

    A.navigational hazards and buoyage,meteorological data,details of pilotage,regulations,port facilities and guides to major port entry

    B.information on charts

    C.information on operational information and regulation

    D.information on tides,currents and characteristics of the sea


    正确答案:A

  • 第3题:

    If a teacher attempts to implement the top-down model to teach listening, he is likely to present_______

    A.new words after playing the tape
    B.new words before playing the tape
    C.background information after playing the tape
    D.background information before playing the tape

    答案:D
    解析:
    考查听力教学模式。“自上而下”模式是一种以听者为基础的听力模式。听者不需要抓住每一个所听到的细节.只需要抓住一些提示,然后根据自身的经验、知识,结合这些提示,从而对所听内容进行猜测和验证,即利用自己先前已有的知识来分析处理所听到的材料。自上而下的理解模式对学生自身的语音系统知识要求不高.但却需要学生掌握一定量的社会规范、文化习俗等背景知识,即运用大脑中存贮的相关背景知识来弥补听力的不足。根据这一理解,教师放录音前提供给学生相关背景知识,以帮助对听力材料的理解。

  • 第4题:

    The term computer describes a device made up of a combination of electronic components.By itself, a computer has no ( ) and is referred to as hardware, which means simply the physical equipment. The hardware can't be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system,hardware,software,data/information, people, procedures and communications.A system is defined as a collection of related components that (请作答此空) to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees with the appropriate kind of information to help them make decisions.Systems analysis and design is to ascertain how a system works and then take steps to make it ( ) Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( )From time to time, organizations need to ( )their information systems, in, responseto new marketing' opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design.

    A.interact
    B.work
    C.connect
    D.change

    答案:A
    解析:
    计算机这个术语描述由电子的和机电的部件组合而成的一种设备。计算机本身没有只能,因此称为硬件,仅仅是物理设备。硬件只有和其他要素连接才能使用,所有这些要素即为构成基于计算机信息系统的六要素:硬件、软件、数据/信息、人、操作程序和通信。系统定义为一组相关组件的集合,这些组件相互交互以完成一个任务,以实现一个目标。任何使用信息技术的组织会拥有一个基于计算机的信息系统,给管理人员(和各类员工)提供适当类型的信息以帮助他们做出决策。系统分析和设计是确定系统如何工作然后经过一系列步骤以使其更好。通常,采用系统方法来定义、描述和解决一个问题或满足一个目标。随着时间推移,新的市场机会、政府规定的变化、新技术的出现、公司兼并以及其他方面的发展等,使得组织需要改变其信息系统。当需要改变时,应用系统分析与设计的时机已经成熟。

  • 第5题:

    The communication management plan determines the information and communications needs of the stakeholders. In the following statements related to communication management plan. ( ) is false.

    • A、The communication management plan is contained in or is a subsidiary plan of, the project management plan.
    • B、The  communication  management  plan  can  be  formal  or informal, highly detailed or broadly framed, and based on the needs of the project.
    • C、The  communication  manamgement  plan  organize  and summarize the information gathered,and present the results of any analysis as comparedthe performance measurement baseline.
    • D、The communication management plan can include guidelines project status meetings,project team meetings,e-meetines,and e-mail

    正确答案:C

  • 第6题:

    Which of the following is the MOST secure and efficient way to dispose of rewritable DVD media containing sensitive information?()

    • A、Media should be erased
    • B、Media should be shredded
    • C、Media should be exposed to UV
    • D、Media should be formatted

    正确答案:B

  • 第7题:

    A technician is troubleshooting a workstation that has the wrong time information. All workstations should be pointing to a central NTP server. Which of the following locations would the technician check to investigate error messages related to this issue?()

    • A、IIS log
    • B、Application log
    • C、System log
    • D、Security log

    正确答案:C

  • 第8题:

    An administrator was asked to log information on possible security breaches on a server.  To which file should additional entries be added to capture this information()

    • A、/var/adm/sulog
    • B、/etc/syslog.conf
    • C、/etc/security/sysck.cfg
    • D、/etc/security/syslog.conf

    正确答案:B

  • 第9题:

    A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()

    • A、/var/adm/sulog
    • B、/etc/syslog.conf
    • C、/etc/security/sysck.cfg
    • D、/etc/security/login.cfg

    正确答案:B

  • 第10题:

    A technician is servicing the Human Resource director’s computer which contains payroll software and salary information. Which of the following should the technician do to ensure confidentiality of the payroll information?()

    • A、Backup the confidential data to the technician’s USB drive to ensure nothing is accidently deleted.
    • B、Uninstall the payroll software to ensure confidentiality.
    • C、Have the director remove sensitive data before the computer will be repaired.
    • D、Perform needed repairs while avoiding sensitive data.

    正确答案:D

  • 第11题:

    单选题
    Who should DECIDE how a company should approach security and what security measures should be implemented?谁应该决定一个公司应该如何对待安全以及实施什么样的安全措施?()
    A

    Data owner 数据拥有者

    B

    Auditor 审计员

    C

    The information security specialist 信息安全专家

    D

    Senior management 高级管理者


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    A technician is troubleshooting a workstation that has the wrong time information. All workstations should be pointing to a central NTP server. Which of the following locations would the technician check to investigate error messages related to this issue?()
    A

    IIS log

    B

    Application log

    C

    System log

    D

    Security log


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Your company network has 500 client computers that run Windows 7. Your team consists of 20 desktop support technicians. Two technicians troubleshoot a hardware-related performance issue on a computer. The technicians obtain different results by using their own User Defined Data Collector Sets. You need to create a standardized Data Collector Set on a network share that is accessible to your team. What should you create?()

    A.Event Trace Data Collector Set

    B.Performance Counter Data Collector Set

    C.Performance Counter Alert Data Collector Set

    D.System Configuration Information Data Collector Set


    参考答案:B

  • 第14题:

    If a teacher attempts to implement the top-down model to teach listening, he/she is likely to present __________.

    A.new words after playing the tape
    B.new words before playing the tape
    C.background information after playing the tape
    D.background information before playing the tape

    答案:D
    解析:
    考查听力教学。“自上而下”模式是一种以听者为基础的听力模式。听者不需要抓住每一个细节,只需要抓住一些提示,然后根据自身的经验、知识,结合这些提示,从而对所听内容进行猜测和验证的过程.即利用自己先前已有的知识来分析处理所听到的材料。自上而下的理解模式对学生自身的语音系统知识要求不高.但却需要学生掌握一定量的社会规范、文化习俗等背景知识,即运用大脑中存贮的相关背景知识来弥补语音的不足。故选D。

  • 第15题:

    ( )is not included in Information Security Risk Assessment Process.

    A.Establishing information security risk criteria
    B.Identifying the information security risks
    C.Formulating an information security risk treatment plan
    D.Analysing the information security risk

    答案:A
    解析:
    信息安全风险评估过程不包括建立信息安全风险准则。

  • 第16题:

    The communication management plan determines the information and communications needs of the stakeholders. In the following statements related to communication management plan. ( ) is false.

    A.The communication management plan is contained in or is A.subsidiary plan of, the project management plan.
    B.The communication management plan can be formal or informal, highly detaileD.or broadly framed, and based on the needs of the project.
    C.The communication manamgement plan organize and summarize the information gathered, and present the results of any analysis as comparedthe performance measurement baseline.
    D.The communication management plan can include guidelines project status meetings, project team meetings, e-meetines, and e-mail.


    答案:C
    解析:
    沟通管理计划用于确定项目干系人的信息需求和沟通方法,以下关于沟通管理计划的叙述中,错误的是:沟通管理计划定期收集、对比和分析基准与实际数据,以便了解和沟通项目进展与绩效情况。A.沟通管理计划是项目管理计划的一部分或子计划 B.沟通管理计划可以根据项目需求是正式或非正式的、非常详细或高度概括的C.沟通管理计划定期收集、对比和分析基准与实际数据,以便了解和沟通项目进展与绩效情况。D.沟通管理计划可包括关于状态会议、项目团队回忆、网络会议和电子邮件等的指南。

  • 第17题:

    Your web application uses a simple architecture in which servlets handle requests and then forward to aJSP using a request dispatcher. You need to pass information calculated by the servlet to the JSP;furthermore, that JSP uses a custom tag and must also process this information. This information mustNOT be accessible to any other servlet, JSP or session in the webapp. How can you accomplish this goal?()

    • A、Store the data in a public instance variable in the servlet.
    • B、Add an attribute to the request object before using the request dispatcher.
    • C、Add an attribute to the context object before using the request dispatcher.
    • D、This CANNOT be done as the tag handler has no means to extract this data.

    正确答案:B

  • 第18题:

    A technician works in a datacenter that is shared by multiple companies. The technician isconcerned with preventing the theft of proprietary information by other technicians with access to the datacenter. Which of the following is the BEST way to prevent data theft in this scenario?()

    • A、Mantraps
    • B、Two-factor authentication
    • C、Security personnel
    • D、Locked rack doors

    正确答案:D

  • 第19题:

    A technician is sent out to a client’s office to solve an issue involving a machine which has numerous Windows XP service failures upon startup. Which of the following would be the FIRST place to check for information on this?()

    • A、Event Viewer
    • B、MSCONFIG
    • C、Services MMC
    • D、Group Policy Editor

    正确答案:A

  • 第20题:

    The pSeries technical specialist has been invited to a briefing on the latest POWER technology as a representative of their team.  What should the specialist offer to do upon return from class in order to best prepare the rest of the team for the introduction of the new technology?()

    • A、Archive the materials in the team’s library.
    • B、Act as the sole technical resource for the team.
    • C、Summarize the information and make it available to the team.
    • D、Evaluate the class and recommend attendance to other team members.

    正确答案:C

  • 第21题:

    Your company network has 500 client computers that run Windows 7. Your team consists of 20 desktop support technicians. Two technicians troubleshoot a hardware-related performance issue on a computer. The technicians obtain different results by using their own User Defined Data Collector Sets. You need to create a standardized Data Collector Set on a network share that is accessible to your team. What should you create?()

    • A、Event Trace Data Collector Set
    • B、Performance Counter Data Collector Set
    • C、Performance Counter Alert Data Collector Set
    • D、System Configuration Information Data Collector Set

    正确答案:B

  • 第22题:

    单选题
    You are the administrator of a Microsoft Windows Server 2003 computer named SQL1. SQL1 runs SQL Server 2005 and is a member of a Microsoft Active Directory domain named Contoso.com. The domain is configured with all of the default settings. Several members of the information security team have requested access to SQL1. The information security team uses the Microsoft Windows XP Professional, Linux, and Macintosh operating systems to perform vulnerability assessments. The information security team members ask you to create two new logon accounts for their use. They would like the logon accounts to have the following user names and passwords: User name/password for first account: pentest/P@ssw0rdUser name/password for second account: hacktest/password You need to provide the information security team with the requested access to SQL1.  Which Transact-SQL script should you use?()
    A

    CREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password'

    B

    CREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password',CHECK_POLICY = OFF

    C

    CREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password'[HASHED]

    D

    CREATE LOGIN [CONTOSO/pentest]FROM WINDOWS CREATE LOGIN [CONTOSO/hacktest]FROM WINDOWS 


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    Stephen Smith feels that
    A

    the security of information on the network used to be a worry.

    B

    all the data should be stored on the same system.

    C

    the company’s computer-based information is well-protected.


    正确答案: C
    解析:
    倒数第二段讲到了系统的安全问题。Smith说到,他们在他们自己内部的安全系统里运行这个软件,数据是在一个特殊的“sandbox”,而这个“sandbox”是与剩余的系统分开的。由此可知,公司的计算机信息是受到良好保护的,所以选C。