单选题Stephen Smith feels thatAthe security of information on the network used to be a worry.Ball the data should be stored on the same system.Cthe company’s computer-based information is well-protected.

单选题
Stephen Smith feels that
A

the security of information on the network used to be a worry.

B

all the data should be stored on the same system.

C

the company’s computer-based information is well-protected.


参考解析

解析:
倒数第二段讲到了系统的安全问题。Smith说到,他们在他们自己内部的安全系统里运行这个软件,数据是在一个特殊的“sandbox”,而这个“sandbox”是与剩余的系统分开的。由此可知,公司的计算机信息是受到良好保护的,所以选C。

相关考题:

Whenever new information is entered, it must be stored somewhere in the computer's(70). RAM only(71)the data temporarily. That is, all information stored in the RAM will disappear if you switch the computer off.A.processorB.keyboardC.printerD.memory

All data are stored in stacked semiconductor dynamic RAM memory boards; the information recorded,the()rate,and the order in which the data are stored differ.A.receiving B.stacking C.sampling D.erasing

( )contributes to monitoring and data collection by defining security monitoring and data collection requirements.A.information continuity managementB.information catalogue managementC.information security managementD.information distribution management

The term computer describes a device made up of a combination of electronic components.By itself, a computer has no ( ) and is referred to as hardware, which means simply the physical equipment. The hardware can't be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system,hardware,software,data/information, people, procedures and communications. A system is defined as a collection of related components that ( ) to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees with the appropriate kind of information to help them make decisions. Systems analysis and design is to ascertain how a system works and then take steps to make it ( ) Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( ) From time to time, organizations need to (5 ) their information systems, in, response to new marketing' opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design.(5)应选( )。 A. modifyB. replaceC. ChangeD. transfer

The term computer describes a device made up of a combination of electronic components.By itself, a computer has no ( ) and is referred to as hardware, which means simply the physical equipment. The hardware can't be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system,hardware,software,data/information, people, procedures and communications.A system is defined as a collection of related components that (请作答此空) to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees with the appropriate kind of information to help them make decisions.Systems analysis and design is to ascertain how a system works and then take steps to make it ( ) Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( )From time to time, organizations need to ( )their information systems, in, responseto new marketing' opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design.A.interactB.workC.connectD.change

The term computer describes a device made up of a combination of electronic components.By itself, a computer has no (请作答此空) and is referred to as hardware, which means simply the physical equipment. The hardware can't be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system,hardware,software,data/information, people, procedures and communications.A system is defined as a collection of related components that ( ) to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees with the appropriate kind of information to help them make decisions.Systems analysis and design is to ascertain how a system works and then take steps to make it ( ) Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( )From time to time, organizations need to ( )their information systems, in, responseto new marketing' opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design.A.informationB.softwareC.intelligenceD.Data

The term computer describes a device made up of a combination of electronic components.By itself, a computer has no ( 1) and is referred to as hardware, which means simply the physical equipment. The hardware can't be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system,hardware,software,data/information, people, procedures and communications. A system is defined as a collection of related components that ( 72) to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees with the appropriate kind of information to help them make decisions. Systems analysis and design is to ascertain how a system works and then take steps to make it (73 ) Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( 74) From time to time, organizations need to (75 ) their information systems, in, response to new marketing' opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design.(1)应选( )。 A. informationB. software C. intelligenceD. Data

Who should DECIDE how a company should approach security and what security measures should be implemented?谁应该决定一个公司应该如何对待安全以及实施什么样的安全措施?()A、Data owner 数据拥有者B、Auditor 审计员C、The information security specialist 信息安全专家D、Senior management 高级管理者

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now according to the company requirement, you are designing a consolidated repository of performance data. You must make sure that the four requirements below are met: the data collector is used to gather performance information; a single database stores performance information for all instances; performance information that is older than 15 days is deleted; reduce the administrative effort to manage performance to the least. So what action should you perform to achieve this goal? () A、You should create a SQL Agent job process on each instance to store and delete performance data in a single database for all instances. B、You should configure a management data warehouse process on each instance, then use this process to store and delete performance data in a single database for all instances. C、You should configure an automated server-side trace process on each instance, then use this process to store and delete performance data in a single database for all instances. D、You should create and schedule a single Microsoft SQL Service Integration Services (SSIS) package process, then use this process to store and delete performance data in a single database for all instances.

What is the goal of the borderless network architecture?()A、to provide users with A single device that permits access to information anywhereB、to provide users with the same productivity and access to information no matter where are or which device they useC、to eliminate the need for border security and firewallsD、to provide companies with A way to extend their security and control over employees on the internet

What is the goal of the borderless network architecture?()A、to provide users withA single device that permits access to information anywhereB、to provide users with the same productivity and access to information no matter where are or which device they useC、to eliminate the need for border security and firewallsD、to provide companies withA way to extend their security and control over employees on the internet

The security team has implemented new guidelines on how to handle sensitive information storedon workstations based on a past incident involving information found on donated workstations.Which of the following should be completed by technicians before donating the workstations?()A、Install a new operating systemB、Delete users’ data before donationC、Write the drive with 1’s and 0’s three timesD、Delete all partitions of the hard drive

You need to recommend a solution for managing the address information of the user accounts. The solution must meet the company’s security requirements. What should you include in the recommendation?()A、Active Directory delegationB、Authorization ManagerC、built-in security groupsD、user rights assignments

You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()A、 Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B、 Use packet filtering on all inbound traffic to the cluster.C、 Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D、 Use intrusion detection on the perimeter network.

You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. There is a user in the Windows SalesManagers group, and he is called Simon. A Reporting Services report is required by Simon to have annual sales information displayed by territory. There is another user in the Windows Sales group, and he is called Jack. He is responsible to report to Simon. A report is required by Jack, and the report is limited to his sales territory, but the same detailed sales data is still displayed, and the detailed sales data is on Simon’s report. A secure solution should be designed to meet the requirements of the users listed above, and the least amount of server resources should be utilized.  Which action should be performed?()A、First, all territory information should be contained by a parameterized report which is designed for Simon. Second, a linked report that links to Simons report should be designed for Jack.B、First, two data regions should be contained by a report which is designed for Simon. Second, one data region should be utilized for summary sales data. Third, the other data region should be utilized for the detailed sales data for each sales representative. Four, a report that displays the detailed sales data should be designed for Jack.C、First, two reports should be designed for Simon. Second, the territory information should be contained by one, and the detailed sales data should be contained by another. At last, a report that displays the detailed sales data for Jack’s territories should be designed for Jack.D、First, the territory information should be contained by a report which is designed for Simon. Second, a report which detailed sales data for Jack’s territories is contained should be designed for Jack. Third, Simon’s report should be set to have the data in Jacks report contained.

You are a database administrator for your company. A user named Susan belongs to the Windows SalesManagers group. Susan needs a Reporting Services report to display annual sales information by territory. A user named Joe reports to Susan and belongs to the Windows Sales group. He needs a report that is limited to his sales territory, but still displays the same detailed sales data that is on Susan’s report. You need to design a secure solution that meets the reporting needs of the users and that consumes the minimal amount of server resources.  What should you do?()A、Design a report for Susan that includes two data regions. One data region is used for summary sales data. The other data region is used for the detailed sales data for each sales representative. Then, design a report for Joe that displays the detailed sales data.B、Design two reports for Susan. One report includes the territory information, and one report includes the detailed sales data. Then, design a report for Joe that displays the detailed sales data for his territories.C、Design a report for Susan that includes the territory information. Then, design a report for Joe that includes detailed sales data for his territories. Finally, configure Susans report so that it includes the data in Joes report.D、Design a parameterized report for Susan that includes all territory information. Then, design a linked report for Joe that links to Susans report.

You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()A、Encrypt customer information when it is stored and when it is being transmittedB、Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkC、Encrypt all marketing information on file servers and client computersD、Require encrypted connections to all file servers

单选题The security team has implemented new guidelines on how to handle sensitive information storedon workstations based on a past incident involving information found on donated workstations.Which of the following should be completed by technicians before donating the workstations?()AInstall a new operating systemBDelete users’ data before donationCWrite the drive with 1’s and 0’s three timesDDelete all partitions of the hard drive

单选题You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()A Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B Use packet filtering on all inbound traffic to the cluster.C Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D Use intrusion detection on the perimeter network.

单选题You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()AEncrypt customer information when it is stored and when it is being transmittedBRequire encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkCEncrypt all marketing information on file servers and client computersDRequire encrypted connections to all file servers

单选题You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. There is a user in the Windows SalesManagers group, and he is called Simon. A Reporting Services report is required by Simon to have annual sales information displayed by territory. There is another user in the Windows Sales group, and he is called Jack. He is responsible to report to Simon. A report is required by Jack, and the report is limited to his sales territory, but the same detailed sales data is still displayed, and the detailed sales data is on Simon’s report. A secure solution should be designed to meet the requirements of the users listed above, and the least amount of server resources should be utilized.  Which action should be performed?()AFirst, all territory information should be contained by a parameterized report which is designed for Simon. Second, a linked report that links to Simons report should be designed for Jack.BFirst, two data regions should be contained by a report which is designed for Simon. Second, one data region should be utilized for summary sales data. Third, the other data region should be utilized for the detailed sales data for each sales representative. Four, a report that displays the detailed sales data should be designed for Jack.CFirst, two reports should be designed for Simon. Second, the territory information should be contained by one, and the detailed sales data should be contained by another. At last, a report that displays the detailed sales data for Jack’s territories should be designed for Jack.DFirst, the territory information should be contained by a report which is designed for Simon. Second, a report which detailed sales data for Jack’s territories is contained should be designed for Jack. Third, Simon’s report should be set to have the data in Jacks report contained.

单选题You need to recommend a solution for managing the address information of the user accounts. The solution must meet the company’s security requirements. What should you include in the recommendation?()AActive Directory delegationBAuthorization ManagerCbuilt-in security groupsDuser rights assignments

单选题You are a database administrator for your company. A user named Susan belongs to the Windows SalesManagers group. Susan needs a Reporting Services report to display annual sales information by territory. A user named Joe reports to Susan and belongs to the Windows Sales group. He needs a report that is limited to his sales territory, but still displays the same detailed sales data that is on Susan’s report. You need to design a secure solution that meets the reporting needs of the users and that consumes the minimal amount of server resources.  What should you do?()ADesign a report for Susan that includes two data regions. One data region is used for summary sales data. The other data region is used for the detailed sales data for each sales representative. Then, design a report for Joe that displays the detailed sales data.BDesign two reports for Susan. One report includes the territory information, and one report includes the detailed sales data. Then, design a report for Joe that displays the detailed sales data for his territories.CDesign a report for Susan that includes the territory information. Then, design a report for Joe that includes detailed sales data for his territories. Finally, configure Susans report so that it includes the data in Joes report.DDesign a parameterized report for Susan that includes all territory information. Then, design a linked report for Joe that links to Susans report.

单选题You are a network administrator for your company. The company has a main office and one branch office. The network consists of a single Active Directory domain. All servers run Windows Server 2003.   The company needs to connect the main office network and the branch office network by using Routing and Remote Access servers at each office. The networks will be connected by a VPN connection over the Internet.   The company’s written security policy includes the following requirements for VPN connections over the Internet:  All data must be encrypted with end-to-end encryption.  VPN connection authentication must be at the computer level.   Credential information must not be transmitted over the Internet as part of the authentication process.   You need to configure security for VPN connection between the main office and the branch office. You need to comply with the written security policy.   What should you do?  ()A Use a PPTP connection with EAP-TLS authentication.B Use a PPTP connection with MS-CHAP v2 authentication.C Use an L2TP connection with EAP-TLS authentication.D Use an L2TP connection with MS-CHAP v2 authentication.

单选题What is the goal of the borderless network architecture?()Ato provide users with A single device that permits access to information anywhereBto provide users with the same productivity and access to information no matter where are or which device they useCto eliminate the need for border security and firewallsDto provide companies with A way to extend their security and control over employees on the internet

单选题You work as a network technician at Company. Your boss, Mrs.   , is interested in   switch spoofing.  She asks you how an attacker would collect information with VLAN hoping  through switch spoofing. You should tell her that the attacking station... ()A...uses VTP to collect VLAN information that is sent out and then tags itself with the domain  information in order to capture the data.B...will generate frames with two 802.1Q headers to cause the switch to forward the frames to a  VLAN that would be inaccessible to the attacker through legitimate means.C...uses DTP to negotiate trunking with a switch port and captures all traffic that is allowed on the  trunk.D...tags itself with all usable VLANs to capture data that is passed through the switch, regardless  of the VLAN to which the data belongs.ENone of the other alternatives apply

单选题Stephen Smith feels thatAthe security of information on the network used to be a worry.Ball the data should be stored on the same system.Cthe company’s computer-based information is well-protected.

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now according to the company requirement, you are designing a consolidated repository of performance data. You must make sure that the four requirements below are met: the data collector is used to gather performance information; a single database stores performance information for all instances; performance information that is older than 15 days is deleted; reduce the administrative effort to manage performance to the least. So what action should you perform to achieve this goal? ()AYou should create a SQL Agent job process on each instance to store and delete performance data in a single database for all instances. BYou should configure a management data warehouse process on each instance, then use this process to store and delete performance data in a single database for all instances. CYou should configure an automated server-side trace process on each instance, then use this process to store and delete performance data in a single database for all instances. DYou should create and schedule a single Microsoft SQL Service Integration Services (SSIS) package process, then use this process to store and delete performance data in a single database for all instances.