单选题Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()AThe cell phone should require a password after a set period of inactivity.BThe cell phone should only be used for company related emails.CThe cell phone data should be encrypted according to NIST standards.DThe cell phone should have data connection abilities disabled.

单选题
Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()
A

The cell phone should require a password after a set period of inactivity.

B

The cell phone should only be used for company related emails.

C

The cell phone data should be encrypted according to NIST standards.

D

The cell phone should have data connection abilities disabled.


参考解析

解析: 暂无解析

相关考题:

Which of the following is the BEST approach a technician should take when informing a customerabout their findings of any specific computer problem?() A. Use non-technical terms.B. Use the appropriate acronyms.C. Use proper technical terms.D. Use email to ensure a written record.

Which of the following is BEST for providing network security?() A.FirewallB.DMZC.SwitchD.IDS

Which of the following are examples of physical security measures?() A. Policies and proceduresB. EncryptionC. Locked doorsD. Security personnelE. Backup tapes

A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?() A. WEPB. Port filteringC. WPAD. Longer SSID broadcast intervals

A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption

Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?() A. Network layer firewallB. Stateful inspection firewallC. Zone aware firewallD. Application layer firewall

Which one is the most important based on the following common elements of a network design?()A、Business needsB、Risk analysisC、Security policyD、Best practices

Which of the following is best practice when disposing of used equipment?()A、Donating to a non-profit groupB、Use a local recycling companyC、Send equipment back to manufacturerD、Following local laws

Which of the following is the BEST approach a technician should take when informing a customerabout their findings of any specific computer problem?()A、Use non-technical terms.B、Use the appropriate acronyms.C、Use proper technical terms.D、Use email to ensure a written record.

Which of the following is BEST for providing network security?()A、FirewallB、DMZC、SwitchD、IDS

A technician installed a new application on a Windows XP desktop. When the technician tries to launch the application it crashes. Which of the following can the technician use to troubleshoot the application?()A、System logsB、Security logsC、Application logsD、Application installation logs

Which of the following provides the BEST security and accountability for a Data Center?()A、Entry loggingB、Combination locksC、Card keysD、Dead bolts

Which of the following BEST describes the function of a DNS server?()A、Secures network traffic through shared key encryption.B、Provides resolution of host names to IP addresses.C、Provides security for a network through the use of ACLs.D、Dynamically assigns IP addresses for easy client configuration.

Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A、The cell phone should require a password after a set period of inactivity.B、The cell phone should only be used for company related emails.C、The cell phone data should be encrypted according to NIST standards.D、The cell phone should have data connection abilities disabled.

Which of the following would be the BEST device to use when removing a loose screw from theinside of a laptop?()A、Needle-nose pliersB、Extension magnetC、Locking pliersD、Loopback plug

A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()A、WEPB、Port filteringC、WPAD、Longer SSID broadcast intervals

Which of the following are examples of physical security measures?()A、Policies and proceduresB、EncryptionC、Locked doorsD、Security personnelE、Backup tapes

Which of the following is the BEST to use when securing fiber cables and preventing damage?()A、Zip tiesB、Twist tiesC、Black electrical tapeD、Velcro cable straps

A user’s OS has become corrupt, and the user would like to restore the PC back to when they first bought the machine. Which of the following would be the BEST choice?()A、Factory Recovery PartitionB、Use Safe ModeC、Last Known Good ConfigurationD、Purchase a copy of the original OS

Which of the following tools would an administrator BEST use to trace a network cable?()A、TonerB、Cable testerC、Butt setD、Multimeter

Your company uses Windows Update to download and install security updates on client computers. When Microsoft releases a security update, you have the following requirements:   Establish which client computers require the security update.   Identify what changes will occur as a result of the security update.  Identify which applications might be affected by the security update.    You need to select the appropriate tool to detect application-compatibility issues.   What should you do?()A、Use the Inventory Collector.B、Use the Setup Analysis Tool.C、Use the Update Compatibility Evaluator.D、Use the Windows Compatibility Evaluator.

Which of the following ports is BEST to use when adding a network printer in Windows XP?()A、USBB、COM5C、LPT1D、TCP/IP

单选题Which of the following provides the BEST security and accountability for a Data Center?()A Entry loggingB Combination locksC Card keysD Dead bolts

单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()AWEP encryptionBChannel rotationCDisable SSIDDWPA encryption

单选题Which of the following ports is BEST to use when adding a network printer in Windows XP?()AUSBBCOM5CLPT1DTCP/IP

单选题Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()ANetwork layer firewallBStateful inspection firewallCZone aware firewallDApplication layer firewall

单选题Which of the following statements is the best title for the passage?ACauses of Accelerating Language DisappearanceBThe Future of LanguageCThe Acceleration of Language DeathDGovernment Language Policies