单选题Which of the following ensures the MOST secure access to a server room?()A ID card readersB Server rack doorsC Biometric devicesD Locked doors

单选题
Which of the following ensures the MOST secure access to a server room?()
A

 ID card readers

B

 Server rack doors

C

 Biometric devices

D

 Locked doors


参考解析

解析: 暂无解析

相关考题:

Which of the following standards or encryption types is the MOST secure for wireless networking?() A.WEPB.AESC.TKIPD.DES

Which of the following is a secure method of remote access via command line?() A.RCPB.TelnetC.RSHD.SSH

A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption

An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?() A.SSHB.WEPC.VPND.WPA

Which of the following is MOST commonly powered using PoE?() A.RoutersB.SwitchesC.LaptopsD.Access points

After creating backups of critical system and user data, which of the following is the BEST location to store the backups?()A、In the supply closet so anyone can access them if neededB、Near the server for easy access to restore filesC、Locked in a cabinet in the IT Manager’s officeD、At a secure off-site storage facility

Cisco Clean Access ensures that computers connecting to your network have which of the following?()A、 No vulnerable applications or operating systemsB、 No viruses or wormsC、 Appropriate security applications and patch levelsD、 Current IPS signaturesE、 Cisco Security Agent

For which of the following campus LAN Areas is the Cisco Catalyst 500 Series switch most suitable?()A、Access AreaB、Backbone AreaC、Core AreaD、Distribution Area

Which of the following standards or encryption types is the MOST secure for wireless networking?()A、WEPB、AESC、TKIPD、DES

Of the threats discussed below, what is the main advantage of using Cisco Secure Desktop which is part of the Cisco ASA VPN solution?()A、 Secure desktop will create a completely separate computing environment thatwill be deleted when you are done.This ensures that no confidential data has been left on the shared/public computer.B、 Secure desktop is used to protect access to your registry and systemfiles when browsing to SSL/VPN protectedpages.C、 Secure Desktop ensures that an SSLprotected password cannotbe exploitedby a man in the middle attackusing a spoofed certificate.D、 Secure desktop hardens the operating system of the machines you are using at the time secure desktop islaunched.

Which of the following methods of user authentication is the MOST secure?()A、CHAPB、KerberosC、TACACSD、EAP

Which of the following technologies is the MOST secure form of wireless encryption?()A、SSLB、WPAC、WEPD、TLS

Which of the following is the MOST secure and efficient way to dispose of rewritable DVD media containing sensitive information?()A、Media should be erasedB、Media should be shreddedC、Media should be exposed to UVD、Media should be formatted

An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA

Which of the following is a secure method of remote access via command line?()A、RCPB、TelnetC、RSHD、SSH

Which of the following wireless security techniques is the MOST secure?()A、Enable Wired Equivalent PrivacyB、Disable SSID broadcastC、Enable Wi-Fi Protected AccessD、Enable MAC filtering

Which of the following should be changed to secure access to a WAPs configuration management interface?()A、SSIDB、WPA2C、DHCPD、Password

Which of the following protocols would BEST grant the user secure access to a remote location?()A、VPNB、FTPC、POP3D、DNS

Which of the following is MOST commonly powered using PoE?()A、RoutersB、SwitchesC、LaptopsD、Access points

Which of the following provides the underlying trust infrastructure to enable easy and secure sharing of information organizations and in cross-premises organizations?()A、Public Key InfrastructureB、Role-based access controlC、FederationD、Digital certificate

Which of the following is the MOST common secure web server port?()A、22B、80C、110D、443

Which of the following ensures the MOST secure access to a server room?()A、 ID card readersB、 Server rack doorsC、 Biometric devicesD、 Locked doors

单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()AWEP encryptionBChannel rotationCDisable SSIDDWPA encryption

单选题After creating backups of critical system and user data, which of the following is the BEST location to store the backups?()AIn the supply closet so anyone can access them if neededBNear the server for easy access to restore filesCLocked in a cabinet in the IT Manager’s officeDAt a secure off-site storage facility

单选题Of the threats discussed below, what is the main advantage of using Cisco Secure Desktop which is part of the Cisco ASA VPN solution?()A Secure desktop will create a completely separate computing environment thatwill be deleted when you are done.This ensures that no confidential data has been left on the shared/public computer.B Secure desktop is used to protect access to your registry and systemfiles when browsing to SSL/VPN protectedpages.C Secure Desktop ensures that an SSLprotected password cannotbe exploitedby a man in the middle attackusing a spoofed certificate.D Secure desktop hardens the operating system of the machines you are using at the time secure desktop islaunched.

单选题Cisco Clean Access ensures that computers connecting to your network have which of the following?()A No vulnerable applications or operating systemsB No viruses or wormsC Appropriate security applications and patch levelsD Current IPS signaturesE Cisco Security Agent

单选题On the WLSE, which of the following fault policies would be used to verify that access to thecommand-line interface of the access point is secure?()Aregistration errorBauthentication failures thresholdCHTTP disabledDTelnet disabled