单选题A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat()AIncident responseBAsset managementCPatch managementDPolicies and procedures
单选题
A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat()
A
Incident response
B
Asset management
C
Patch management
D
Policies and procedures
参考解析
解析:
暂无解析
相关考题:
Which of the following best summarizes the main idea of the text?[A] The Internet is posing a threat to publishers.[B] A new mode of publication is emerging.[C] Authors welcome the new channel for publication.[D] Publication is rendered easier by online service.
Which of the following best summarizes the main idea of the passage?A.The Internet is posing a threat to publishers.B.A new mode of publication is emerging.C.Authors welcome the new channel for publication.D.Publication is rendered easier by online service.
() seeks to perform. root cause investigation as to what is leading identified trends. A、Problem managementB、Incident managementC、Change managementD、Knowledge management
Which of the following should be updated when new computers are purchased?() A. Asset managementB. Change managementC. Cable managementD. Baselines
A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat() A. Incident responseB. Asset managementC. Patch managementD. Policies and procedures
()seeks to perform root cause investigation as to what is leading identified trendsA.Problem managementB.Incident managementC.Change managementD.Knowledge management
Which Service component in Cisco Unified Communications operate phase identifies and solves reoccurring incidents by analyzing incident trends to identify patterns and systemic conditions()A、Problem ManagementB、Incident ManagementC、Change ManagementD、Systems Monitoring
In the operate phase, providing and maintaining reliable, current information about the WLANsystem hardware, software, and applications pertinent to the system’s individual components andattributes is part of which service component?()A、Problem ManagementB、Configuration ManagementC、Incident ManagementD、Change Management
Which of the following should be updated when new computers are purchased?()A、Asset managementB、Change managementC、Cable managementD、Baselines
In the operate phase, providing and maintaining reliable, current information about the wlan system hardware, software,and applications pertinent to the system’s individual components and attributes is part of which service component?()A、problem managementB、configuration managementC、incident managementD、change management
Which service component in the wireless operate phase helps isolate and resolve an incident?()A、change managementB、configuration managementC、incident managementD、acceptance test plan
Which of the following specifies a set of consistent requirements for a workstation or server?()A、Vulnerability assessmentB、Imaging softwareC、Patch managementD、Configuration baseline
Which of the following is the FIRST thing to consider when designing an email retention policy?()A、 Local laws and industry regulationsB、 Company policies and guidelinesC、 Project guidelines given by stakeholdersD、 Mail server and backup capacity
Which of the following will help protect an operating system from vulnerability?()A、Download free anti-virus programs from the Internet.B、Perform updates from the manufacturers website regularly.C、Using the operating systems email program only to open attachments.D、Monitoring what is displayed on the screen.
Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A、The cell phone should require a password after a set period of inactivity.B、The cell phone should only be used for company related emails.C、The cell phone data should be encrypted according to NIST standards.D、The cell phone should have data connection abilities disabled.
A technician is attempting to determine whether a CAT5 patch cord is a straight-through or acrossover. Which of the following is the BEST to use to determine the cord type?()A、Cable testerB、Loopback cableC、MultimeterD、Extension magnet
A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat()A、Incident responseB、Asset managementC、Patch managementD、Policies and procedures
An administrator needs to implement a security patch policy on the network that adheres to an internal SLA. Which of the following actions BEST achieves this task?()A、Define a test server group, install the patches and if successful schedule installation on production servers.B、Define a test server group, schedule installation on production servers and then install all updates and patches.C、Install the patches during a non-working hour.D、Send an email to all company users and request the best time for installation.
单选题A technician is attempting to determine whether a CAT5 patch cord is a straight-through or acrossover. Which of the following is the BEST to use to determine the cord type?()ACable testerBLoopback cableCMultimeterDExtension magnet
单选题Which of the following will help protect an operating system from vulnerability?()ADownload free anti-virus programs from the Internet.BPerform updates from the manufacturers website regularly.CUsing the operating systems email program only to open attachments.DMonitoring what is displayed on the screen.
单选题The company has two thousand servers located around the globe. Which of the following is the BEST method of patch management and deployment?()ASet all servers to automatically download patches from the manufacturer’s website.BInstall an internal patch management system and deploy from the system.CInstall the patches on each server from a deployment disk.DRDP into each server, manually download and install the patches.
单选题Client exclusion policies are used to mitigate which of the following attacks?()AdictionaryBbit-flip and replayCmac spoofingDman-in-the-middle
单选题Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()AThe cell phone should require a password after a set period of inactivity.BThe cell phone should only be used for company related emails.CThe cell phone data should be encrypted according to NIST standards.DThe cell phone should have data connection abilities disabled.
单选题A company printer is used to print payroll checks on paper forms with carbon backing. Which ofthe following is the BEST type of printer for this scenario?()ALaserBImpactCInkjetDThermal
单选题Which of the following is the FIRST thing to consider when designing an email retention policy?()A Local laws and industry regulationsB Company policies and guidelinesC Project guidelines given by stakeholdersD Mail server and backup capacity
单选题An administrator needs to implement a security patch policy on the network that adheres to aninternal SLA. Which of the following actions BEST achieves this task?()A Define a test server group, install the patches and if successful schedule installation on production servers.B Define a test server group, schedule installation on production servers and then install all updates and patches.C Install the patches during a non-working hour.D Send an email to all company users and request the best time for installation.
单选题An administrator needs to implement a security patch policy on the network that adheres to an internal SLA. Which of the following actions BEST achieves this task?()ADefine a test server group, install the patches and if successful schedule installation on production servers.BDefine a test server group, schedule installation on production servers and then install all updates and patches.CInstall the patches during a non-working hour.DSend an email to all company users and request the best time for installation.