单选题Operation security requires the implementation of physical security to con-trol which of the following? 操作安全要求对下列哪项实施物理安全控制?()Aevacuation procedures 撤离步骤Bincoming hardware 硬件搬入Ccontingency conditions 应急条件Dunauthorized personnel access 未经授权的人员访问

单选题
Operation security requires the implementation of physical security to con-trol which of the following? 操作安全要求对下列哪项实施物理安全控制?()
A

evacuation procedures 撤离步骤

B

incoming hardware 硬件搬入

C

contingency conditions 应急条件

D

unauthorized personnel access 未经授权的人员访问


参考解析

解析: 暂无解析

相关考题:

The time necessary to complete a project is called the _______ of a project.A.Implementation TimeB.Life CycleC.Operation TimeD.Critical PathE.Completion Phase

● The time necessary to complete a project is called the _______ of a project.A Implementation TimeB Life CycleC Operation TimeD Critical PathE Completion Phase

a firewall is both policy and the implementation of that policy in terms of (),(),and (), as well as other security measures A、network configurationB、host systemsC、routersD、softwares

Ship security officer is __________.A.the guard posted on the vesselB.a person responsible for implementation of international ship and port security code on board shipC.the master of the vesselD.All the above

You are developing a Windows Communication Foundation (WCF) service. The service operation takes a customer number as the only argument and returns information about the customer. The service requires a security token in the header of the message. You need to create a message contract for the service.Which code segment should you use?()A.B.C.D.

The operation of _______two alternators requires the voltages to be equal and also in phaseA.parallelingB.series-mountingC.runningD.controlling

Which of the following are examples of physical security measures?() A. Policies and proceduresB. EncryptionC. Locked doorsD. Security personnelE. Backup tapes

()is not included in the main contents of the operation and maintenance of the information system.A.Daily operation and maintenanceB.System changeC.Security managementD.Business change

Which service component within the prepare phase recommends the appropriate technology strategy to address a business requirement of the customer?()A、 identifying what a customer requires from a proposed solutionB、 analyzes the customer s business requirements and recommends the appropriate Cisco technologies to meet business requirementsC、 determining what end-user training a customer requiresD、 addressinga customer s physical requirements

Which definition best describes the implementation service component within the implement phase? Select exactly 1 answer(s) from the following:()。A、providing a step-by-step plan that details the installation and service-commission tasks required in order to create a controlled-implementation environment that emulates a customer networkB、assessing the ability of site facilities to accommodate proposed infrastructure changesC、developing and executing proof-of-concept tests, validating high-level infrastructure design, and identifying any design enhancementsD、installing, configuring, and integrating systems components based on an implementation plan developed in earlier phasesE、improving a customer’s infrastructure security system

For the following statements, which one is perceived as a drawback of implementing Fibre ChannelAuthentication Protocol (FCAP)?()A、It is restricted in size to only three segmentsB、It requires the use of netBT as the network protocolC、It requires the implementation of IKED、It relies on an underlying Public Key Infrastructure

Which statement describes the behavior of a security policy?()A、The implicit default security policy permits all traffic.B、Traffic destined to the device itself always requires a security policy.C、Traffic destined to the device’s incoming interface does not require a security policy.D、The factory-default configuration permits all traffic from all interfaces.

Which is NOT part of a typical wireless site survey?()A、Implementation suggestionsB、Access point locationsC、Security requirementsD、Access point mounting methods

Which should be the key driver for a company security policy’s creation, implementation and enforcement?()A、 the business knowledge of the IT staffB、 the technical knowledge of the IT staffC、 the company’s business objectivesD、 the company’s network topologyE、 the IT future directions

For the following attempts, which one is to ensure that no one employee becomes a pervasive securitythreat, that data can be recovered from backups, and that information system changes do not compromisea system’s security?()A、Strategic security planningB、Disaster recoveryC、Implementation securityD、Operations security

Operation security requires the implementation of physical security to con-trol which of the following? 操作安全要求对下列哪项实施物理安全控制?()A、evacuation procedures 撤离步骤B、incoming hardware 硬件搬入C、contingency conditions 应急条件D、unauthorized personnel access 未经授权的人员访问

Which of the following are examples of physical security measures?()A、Policies and proceduresB、EncryptionC、Locked doorsD、Security personnelE、Backup tapes

You are creating a Windows Communication Foundation (WCF) service based on WSHttpBinding. New audit requirements dictate that callers must be authenticated on every call to ensure that their credentials have not been revoked.You need to ensure that the service will not cache the security request token. What should you do?()A、Apply a ServiceBehavior attribute to the service implementation class with the lnstanceContextMode property set to Single.B、In the message security configuration, change clientCredentialType from lssuedToken to UserNameC、In the message security configuration, set establishSecurityContext to false.D、At the end of every operation, call the SessionStateUtility.RaiseSessionEnd method.

单选题()means the person on board the ship, accountable to the master, designated by the Company as responsible for the security of the ship, including implementation and maintenance of the ship security plan and for liaison with the company security officer and port facility security officers.AShip security officerBCompany security officerCPort facility security officerDPSC officer

单选题Proper operation of the main engine reduction gear set requires the operation to monitor ()Athe sump oil levelBoil flow sight glassesCbearing temperaturesDall of the above

单选题()means the person designated as responsible for the development, implementation, revision and maintenance of the port facility security plan and for liaison with the ship security officers and company security officers.AShip security officerBCompany security officerCPort facility security officerDPSC officer

多选题Which operation requires that you create an auxiliary instance manually before executing the operation?()ABackup-based database duplication.BActive database duplication.CTablespace point-in-time recovery.DNo operation requires the creation of an auxiliary instance.

单选题You are the desktop administrator for one of your company's branch offices. The network in your branch office contains 100 Windows XP Professional computers. The computers are configured with the Compatws.inf security template. One of the network administrators in the company's main office creates a new security template named CompanySec.inf. The new template is designed to be applied to each of the company's Windows XP Professional computers. The users in your branch office have different security requirements from the users in the main office. You need to find out whether the new security template will violate the security requirements of the users in the branch office. What should you do?()ARun the Secedit.exe command in validation mode and specify the new security template.BRun the Secedit.exe command in configuration mode and specify the new security template. CUse the Security Configuration and Analysis console to import both templates into a security database, and then perform an Analyze operation. DUse the Security Configuration and Analysis console to import both templates into a security database, and then perform a Configure operation.

单选题Which should be the key driver for a company security policy’s creation, implementation and enforcement?()A the business knowledge of the IT staffB the technical knowledge of the IT staffC the company’s business objectivesD the company’s network topologyE the IT future directions

单选题Which statement describes the behavior of a security policy?()AThe implicit default security policy permits all traffic.BTraffic destined to the device itself always requires a security policy.CTraffic destined to the device’s incoming interface does not require a security policy.DThe factory-default configuration permits all traffic from all interfaces.

单选题The operation of paralleling two alternators requires the voltages to be ()and also in phase.AzeroBeliminatedCdifferentDequal

单选题You are creating a Windows Communication Foundation (WCF) service based on WSHttpBinding. New audit requirements dictate that callers must be authenticated on every call to ensure that their credentials have not been revoked.You need to ensure that the service will not cache the security request token. What should you do?()AApply a ServiceBehavior attribute to the service implementation class with the lnstanceContextMode property set to Single.BIn the message security configuration, change clientCredentialType from lssuedToken to UserNameCIn the message security configuration, set establishSecurityContext to false.DAt the end of every operation, call the SessionStateUtility.RaiseSessionEnd method.

单选题For the following statements, which one is perceived as a drawback of implementing Fibre ChannelAuthentication Protocol (FCAP)?()AIt is restricted in size to only three segmentsBIt requires the use of netBT as the network protocolCIt requires the implementation of IKEDIt relies on an underlying Public Key Infrastructure