多选题Which of the following are examples of physical security measures?()APolicies and proceduresBEncryptionCLocked doorsDSecurity personnelEBackup tapes

题目
多选题
Which of the following are examples of physical security measures?()
A

Policies and procedures

B

Encryption

C

Locked doors

D

Security personnel

E

Backup tapes


相似考题
更多“多选题Which of the following are examples of physical security measures?()APolicies and proceduresBEncryptionCLocked doorsDSecurity personnelEBackup tapes”相关问题
  • 第1题:

    A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()

    A. WEP

    B. Port filtering

    C. WPA

    D. Longer SSID broadcast intervals


    参考答案:C

  • 第2题:

    Guards are appropriate whenever the function required by the security program involves which of the following?守卫合适执行安全程序所涉及以下哪一项功能?()

    • A、The use of discriminating judgment使用辨别判断能力的时候
    • B、The use of physical force使用暴力的时候

    正确答案:A

  • 第3题:

    Choose the service component in the optimize phase which assesses the wlan system and drives continuous improvements by recommending remediation measures including device configuration optimization, capacity planning, traffic analysis, security assessment, ()and quality issue resolution.

    • A、technology assessment
    • B、operations assessment
    • C、security assessment
    • D、security administration
    • E、change management

    正确答案:A

  • 第4题:

    A datacenter director implements a new security measure in response to multiple equipment thefts from the datacenter. The new security measure requires people entering or leaving the data center to go through an extra secure area. Once entering the area people must present two forms of authentication to leave. Which of the following security measures does this describe?()

    • A、Mantrap
    • B、RFID cards
    • C、Defense in depth
    • D、Biometrics

    正确答案:A

  • 第5题:

    Operation security requires the implementation of physical security to con-trol which of the following? 操作安全要求对下列哪项实施物理安全控制?()

    • A、evacuation procedures 撤离步骤
    • B、incoming hardware 硬件搬入
    • C、contingency conditions 应急条件
    • D、unauthorized personnel access 未经授权的人员访问

    正确答案:D

  • 第6题:

    A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()

    • A、WEP
    • B、Port filtering
    • C、WPA
    • D、Longer SSID broadcast intervals

    正确答案:C

  • 第7题:

    Which of the following are examples of physical security measures?()

    • A、Policies and procedures
    • B、Encryption
    • C、Locked doors
    • D、Security personnel
    • E、Backup tapes

    正确答案:C,D

  • 第8题:

    A tape library can be defined as which of the following?()

    • A、 A way to catalog tapes after a tape backup to easily identify and retrieve data.
    • B、 A modular tape backup system containing multiple drives, tapes, and connections.
    • C、 A database consisting of all backups performed and the contents of each backup.
    • D、 An offsite storage facility to house tapes in case of a disaster for easy site recovery.

    正确答案:B

  • 第9题:

    Which of the following commands indicates the available state of a physical adapter?()

    • A、lscfg
    • B、lsdev
    • C、netstat
    • D、ifconfig

    正确答案:B

  • 第10题:

    多选题
    Which of the following are examples of traffic that can be created as part of an IP Service -Level Agreement operation?()
    A

    ICMP Echo

    B

    VoIP (RTP)

    C

    IPX

    D

    SNMP


    正确答案: C,A
    解析: 暂无解析

  • 第11题:

    单选题
    The Ship Security Plan should indicate the operational and physical () the ship itself should take to ensure it always operates at security level 1.
    A

    precaution measures

    B

    safety measures

    C

    security measures

    D

    emergency response measures


    正确答案: D
    解析: 暂无解析

  • 第12题:

    多选题
    Which of the following are benefits of the HCL?()
    A

    Enhanced stability

    B

    Vendor supported

    C

    Higher number of available component choices

    D

    Lower cost

    E

    Enhanced security


    正确答案: A,B
    解析: 暂无解析

  • 第13题:

    Examples of types of physical access controls include all EXCEPT which of the following? 以下哪一个选项不属于典型的物理访问控制手段?()

    • A、passwords密码
    • B、guards守卫
    • C、locks锁
    • D、badges徽章

    正确答案:A

  • 第14题:

    Which method is of gaining access to a system that bypasses normal security measures?()

    • A、Starting a Smurf attack
    • B、Conducting social engineering
    • C、Creating a back door
    • D、Launching a DoS attack

    正确答案:C

  • 第15题:

    Which of the following are examples of traffic that can be created as part of an IP Service -Level Agreement operation?()

    • A、ICMP Echo
    • B、VoIP (RTP)
    • C、IPX
    • D、SNMP

    正确答案:A,B

  • 第16题:

    There are many reasons why customers lack sufficient security measures on the network. Which two reasons for insufficient security are typical of the customers today?()

    • A、the use of hosted email services eliminating the need for local security
    • B、the perceived costs of security solutions
    • C、the lack of risk analysis
    • D、the lack of threats to their network
    • E、the belief that free security tools are sufficient
    • F、the desire to avoid unnecessary technologies

    正确答案:B,C

  • 第17题:

    Which of the following is BEST for providing network security?()

    • A、Firewall
    • B、DMZ
    • C、Switch
    • D、IDS

    正确答案:A

  • 第18题:

    Which of the following BEST describes how server virtualization can cut down IT costs? ()

    • A、 Server virtualization increases server application performance allowing productivity to be increased.
    • B、 Server virtualization simplifies server administration and reduces the IT department staffing needs.
    • C、 Server virtualization implements higher security measures at the server OS level reducing the need for other security implementations.
    • D、 Server virtualization is a more efficient use of hardware for multiple servers reducing the resource utilization.

    正确答案:D

  • 第19题:

    Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()

    • A、Baseline configuration
    • B、Security policy
    • C、Performance and transaction logs
    • D、Physical network diagram

    正确答案:D

  • 第20题:

    Which of the following options should be used to obtain the latest security patches for AIX?()

    • A、FixDist
    • B、The Bonus Pack CD
    • C、OPS
    • D、The Security Maintenance CD

    正确答案:D

  • 第21题:

    单选题
    Which of the following marine examples belongs to the open loop control system?()
    A

    Accommodation heating system

    B

    Steering gear

    C

    Boiler control

    D

    Cargo control


    正确答案: D
    解析: 暂无解析

  • 第22题:

    多选题
    There are many reasons why customers lack sufficient security measures on the network. Which two reasons for insufficient security are typical of the customers today?()
    A

    the use of hosted email services eliminating the need for local security

    B

    the perceived costs of security solutions

    C

    the lack of risk analysis

    D

    the lack of threats to their network

    E

    the belief that free security tools are sufficient

    F

    the desire to avoid unnecessary technologies


    正确答案: F,E
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following is the most costly countermeasure to reducing physical security risks?物理安全风险的防控措施中,下列哪一项成本最高?()
    A

    A .Procedural Controls流程控制

    B

    B. Electronic Systems电子系统

    C

    C .Security Guards安全守卫

    D

    D .Hardware Devices硬件设备


    正确答案: B
    解析: 暂无解析