单选题“可信任身份(Trusted Identities)”的作用是()A启动Adobe Acrobat时保证程序完整性的自我验证用B为文档的指定用户规定权限C用来验证所用的Acrobat序列号是否合法D在线升级Acrobat时用来识别正版用户的身份
单选题
“可信任身份(Trusted Identities)”的作用是()
A
启动Adobe Acrobat时保证程序完整性的自我验证用
B
为文档的指定用户规定权限
C
用来验证所用的Acrobat序列号是否合法
D
在线升级Acrobat时用来识别正版用户的身份
参考解析
解析:
暂无解析
相关考题:
在应用程序中接收到如下内容,请选出对其可信任程度描述正确的一项。()A、来自设置为不可编辑的输入框的内容可信任B、来自设置为隐藏域的内容可信任C、来自客户端提交Cookie的内容可信任D、来自客户端提交的Agent域的内容可信任E、以上内容均不可信
he Cisco Nexus 1000V Series Switches are virtual machine access switches that are an intelligent software switch implementation for VMware vSphere environments running the Cisco NX-OS Software operating system. Together with the VMware ESX hypervisor, the Nexus 1000V supports Cisco VN-Link server virtualization technology, which provides mobile virtual machine security and network policy for VMware View components, including the DHCP snooping feature. DHCP snooping is disabled on the Nexus 1000V by default. When the DHCP snooping feature is enabled on the Nexus 1000V, what are the default trust settings for the vEthernet and uplink ports?() A、 All vEthernet ports are trusted, and all Ethernet ports such as uplinks and port channels are trusted.B、 All vEthernet ports are not trusted, and all Ethernet ports such as uplinks and port channels are not trusted.C、 All vEthernet ports are trusted and all Ethernet ports such as uplinks and port channels are not trusted.D、 All vEthernet ports are not trusted and all Ethernet ports such as uplinks and port channels are trusted.
When configuring IOS firewall (CBAC) operations on Cisco routers, the "inspection rule" could be applied at which two locations? ()A、 at the untrusted interfacein the inbound directionB、 atthe untrusted interface in theoutbounddirectionC、 at thetrusted interface inthe inbound directionD、 at the trusted interface in the outbound directionE、 at the trusted and untrusted interfaces in the inbound directionF、 at the trusted and untrusted interfaces in the outbounddirection
Which of the following components are considered part of the Trusted Com-puting Base? 以下哪几部分组件被认为是可信计算基的一部分吗?()A、trusted hardware, software and firmware 可信的硬件,软件和固件B、trusted hardware and software 可信的硬件和软件C、trusted computer operators and system managers 可信的操作员和系统管理员D、trusted hardware and firmware 可信的硬件和固件
Configuration Management controls what? 配置管理控制什么?()A、Auditing and controlling any changes to the Trusted Computing Base. 审计和控制对可信计算基的任何更改B、Auditing of changes to the Trusted Computing Base. 审计可信计算基的变更C、Control of changes to the Trusted Computing Base. 控制可信计算的变更D、Changes in the configuration access to the Trusted Computing Base. 对可信计算基配置访问的变更
所谓的可信任系统(Trusted System)是美国国防部定义的安全操作系统标准,常用的操作系统 UNIX 和 Windows NT 等可以达到该标准的()级A、DB、C1C、C2D、B2
多选题When configuring IOS firewall (CBAC) operations on Cisco routers, the "inspection rule" could be applied at which two locations? ()Aat the untrusted interfacein the inbound directionBatthe untrusted interface in theoutbounddirectionCat thetrusted interface inthe inbound directionDat the trusted interface in the outbound directionEat the trusted and untrusted interfaces in the inbound directionFat the trusted and untrusted interfaces in the outbounddirection
单选题在处理网络安全时,InternetExplorer会提供各种级别的保护:分别是()。AInternet、本地Intranet、可信任站点、受限制的站点BEXTRANET、本地Intranet、可信任站点、受限制的站点CInternet、本地Intranet、可信任站点、NSFNETDInternet、本地Intranet、ARPNET、NSFNET
单选题中行移动柜台TPM2.0开启的选项是()Aadvanced-trusted-computing-device selectBadvanced-test-computing-device selectCadvanced-trusted-caster-device selectDpower-trusted-computing-device select
单选题防火墙内部的网络称为()网络。A可依靠B可信任C不可依靠D不可信任