Policies and procedures
Encryption
Locked doors
Security personnel
Backup tapes
第1题:
A. WEP
B. Port filtering
C. WPA
D. Longer SSID broadcast intervals
第2题:
Guards are appropriate whenever the function required by the security program involves which of the following?守卫合适执行安全程序所涉及以下哪一项功能?()
第3题:
Choose the service component in the optimize phase which assesses the wlan system and drives continuous improvements by recommending remediation measures including device configuration optimization, capacity planning, traffic analysis, security assessment, ()and quality issue resolution.
第4题:
A datacenter director implements a new security measure in response to multiple equipment thefts from the datacenter. The new security measure requires people entering or leaving the data center to go through an extra secure area. Once entering the area people must present two forms of authentication to leave. Which of the following security measures does this describe?()
第5题:
Operation security requires the implementation of physical security to con-trol which of the following? 操作安全要求对下列哪项实施物理安全控制?()
第6题:
A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()
第7题:
Which of the following are examples of physical security measures?()
第8题:
A tape library can be defined as which of the following?()
第9题:
Which of the following commands indicates the available state of a physical adapter?()
第10题:
ICMP Echo
VoIP (RTP)
IPX
SNMP
第11题:
precaution measures
safety measures
security measures
emergency response measures
第12题:
Enhanced stability
Vendor supported
Higher number of available component choices
Lower cost
Enhanced security
第13题:
Examples of types of physical access controls include all EXCEPT which of the following? 以下哪一个选项不属于典型的物理访问控制手段?()
第14题:
Which method is of gaining access to a system that bypasses normal security measures?()
第15题:
Which of the following are examples of traffic that can be created as part of an IP Service -Level Agreement operation?()
第16题:
There are many reasons why customers lack sufficient security measures on the network. Which two reasons for insufficient security are typical of the customers today?()
第17题:
Which of the following is BEST for providing network security?()
第18题:
Which of the following BEST describes how server virtualization can cut down IT costs? ()
第19题:
Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()
第20题:
Which of the following options should be used to obtain the latest security patches for AIX?()
第21题:
Accommodation heating system
Steering gear
Boiler control
Cargo control
第22题:
the use of hosted email services eliminating the need for local security
the perceived costs of security solutions
the lack of risk analysis
the lack of threats to their network
the belief that free security tools are sufficient
the desire to avoid unnecessary technologies
第23题:
A .Procedural Controls流程控制
B. Electronic Systems电子系统
C .Security Guards安全守卫
D .Hardware Devices硬件设备