Which of the following is given the responsibility of the maintenance and protection of the data?下列哪一角色对数据的维护和保护负有责任()A、Security administrator 安全管理员B、Data custodian 数据管理者C、Data owner 数据拥有者D、User 用户

Which of the following is given the responsibility of the maintenance and protection of the data?下列哪一角色对数据的维护和保护负有责任()

  • A、Security administrator 安全管理员
  • B、Data custodian 数据管理者
  • C、Data owner 数据拥有者
  • D、User 用户

相关考题:

Data Set对象的Merge方法用于() A.将两个Data Set中的数据和架构合并到一个Data Set中B.将两个Data Table中的行合并到一个Data Table中C.向数据源提交修改D.从数据源提取数据

Which of the following is not responsibility of DBA(Data Base Administrator)?A.Database management system designB.Database schema definitionC.Database schema modificationD.Integrity constraint specification

在PowerBuilder应用程序中,对数据库数据的操作是通过下列哪一个对象进行的?A.Data WindowB.WindowC.ApplicationD.User Object

eNodeB上的『____』子层对控制面数据进行完整性保护和加密处理。( 『____』sub-layerof eNodeB control plane data integrity protection and encryption processing.)

IMSHSS中存储着AS可以访问的数据,这些数据不包括()A、透明数据(Repository Data)B、公有用户标识(IMPU或PSI)(IMS Public Identity)C、IMPU或PSI的用户状态(IMS User State)D、鉴权数据

对于持续数据保护(CDP,Continuous Data Protection)理论上能够备份恢复。

In discretionary access environments, which of the following entities is authorized to grant information access to other people?在自主访问环境下,下列哪个实体有权授予其他人信息访问权限?()A、Data Owner数据的所有者B、Manager经理人员C、Security Manager安全经理D、Group Leader小组领导

下面哪个角色对数据的安全负责?()A、数据拥有者B、数据监管人员C、用户D、安全管理员

Who should DECIDE how a company should approach security and what security measures should be implemented?谁应该决定一个公司应该如何对待安全以及实施什么样的安全措施?()A、Data owner 数据拥有者B、Auditor 审计员C、The information security specialist 信息安全专家D、Senior management 高级管理者

What is a "system high" security policy?什么是一个“系统高”的安全策略?()A、A system where all users are cleared to view the most highly classified data on the system.系统上的所有用户被许可查看最高级别的数据B、A system that contains only data of one security classification.只包含一个安全级别的数据C、A system with data that contains only data of the highest security classification.只包含最高安全级别的数据D、A system that uses a Multi-Level Security Policy to separate the highly classified data from the other data residing on the system.使用多级安全策略去划分高级别数据和其他数据。

网络操作系统应当提供哪些安全保障()A、验证(Authentication)B、授权(Authorization)C、数据保密性(Data Confidentiality)D、数据一致性(Data Integrity)E、数据的不可否认性(Data Nonrepudiation)

RMIS数据库中数据类型一般可分为()A、损失数据(Loss Data)B、暴露单位数据(Exposure Data)C、法律数据(Legal Data)D、经济数据(Financial Data)E、风险控制数据(Risk Control Data)和风险财务数据(Risk Financial Data)

Which of the following is the MOST important consideration when implementing a data retentio program?()A、 The data destruction requirementsB、 The user awareness training programC、 The laws and legal requirements of the dataD、 The companys individual data retention policies

An administrator wants to limit how much data each user is storing. Which of the following will BEST address this issue?()A、 QuotasB、 SNMPC、 Disk managementD、 ACL

Which of these user ICAP?()A、 anti-malware scanningB、 data loss prevention policesC、 decryption policiesD、 CiscoIronPort Data Security policies

1850 TSS-320数据业务的传送方式有()A、数据到数据的交换(Pure Data Switching)B、SDH承载数据(Data over SDH)C、波分承载数据(Data ove rWDM)

用于计费的用户数据记录(User Data Records,UDR)是由()网元产生的?A、DNSB、AAAC、PDSND、PCF

A system administrator has a filesystem called /test/data in volume group datavg. Which of the following commands will allow the administrator to create a mirrored copy of the filesystem’s data?()A、chfsB、chlvC、mklvcopyD、mkfscopy

Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). You have a file server that contains two volumes named C and D. Volume C contains a folder named User1data. User1 is the owner of all files in the User1data folder. You copy the User1data folder to volume D. You examine the ownership of the User1data folder on volume D and discover that your user account is listed as the owner. You need to ensure that User1 is the owner of the User1data folder on volume D. What should you do? ()A、Modify the Advanced Security settings for the User1data folder.B、Modify the Advanced Attributes settings for the User1data folder.C、Delete the User1data folder on volumeD、From Windows Explorer, move the User1data folder from volume C to volume

单选题What is a "system high" security policy?什么是一个“系统高”的安全策略?()AA system where all users are cleared to view the most highly classified data on the system.系统上的所有用户被许可查看最高级别的数据BA system that contains only data of one security classification.只包含一个安全级别的数据CA system with data that contains only data of the highest security classification.只包含最高安全级别的数据DA system that uses a Multi-Level Security Policy to separate the highly classified data from the other data residing on the system.使用多级安全策略去划分高级别数据和其他数据。

单选题An administrator wants to limit how much data each user is storing. Which of the following will BEST address this issue?()A QuotasB SNMPC Disk managementD ACL

多选题RMIS数据库中数据类型一般可分为()A损失数据(Loss Data)B暴露单位数据(Exposure Data)C法律数据(Legal Data)D经济数据(Financial Data)E风险控制数据(Risk Control Data)和风险财务数据(Risk Financial Data)

单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). You have a file server that contains two volumes named C and D. Volume C contains a folder named User1data. User1 is the owner of all files in the User1data folder. You copy the User1data folder to volume D. You examine the ownership of the User1data folder on volume D and discover that your user account is listed as the owner. You need to ensure that User1 is the owner of the User1data folder on volume D. What should you do? ()AModify the Advanced Security settings for the User1data folder.BModify the Advanced Attributes settings for the User1data folder.CDelete the User1data folder on volumeDFrom Windows Explorer, move the User1data folder from volume C to volume

单选题Which of the following is the MOST important consideration when implementing a data retentio program?()A The data destruction requirementsB The user awareness training programC The laws and legal requirements of the dataD The companys individual data retention policies

单选题下面哪个角色对数据的安全负责?()A数据拥有者B数据监管人员C用户D安全管理员

单选题Which of the following is given the responsibility of the maintenance and protection of the data?下列哪一角色对数据的维护和保护负有责任()ASecurity administrator 安全管理员BData custodian 数据管理者CData owner 数据拥有者DUser 用户

单选题Which of these user ICAP?()A anti-malware scanningB data loss prevention policesC decryption policiesD CiscoIronPort Data Security policies