What security procedure would force/require an employee to work in collusion with another employee of the company in order to have access to unauthorized da-ta or to defeat the company security mechanisms? 什么样的安全程序会迫使雇员与其他的雇员勾结,来访问未经授权的数据,从而绕过公司的安全机制?()A、Security personel monitoring of audit logs. 安全人员监控审计日志B、Periodically reviewing subject's access rights. 定期审查主体的访问C、Limiting the specific accesses of operations personnel. 限制操作人员的特定访问D、Job rotation of people through different assignments. 通过人员的工作轮换

What security procedure would force/require an employee to work in collusion with another employee of the company in order to have access to unauthorized da-ta or to defeat the company security mechanisms? 什么样的安全程序会迫使雇员与其他的雇员勾结,来访问未经授权的数据,从而绕过公司的安全机制?()

  • A、Security personel monitoring of audit logs. 安全人员监控审计日志
  • B、Periodically reviewing subject's access rights. 定期审查主体的访问
  • C、Limiting the specific accesses of operations personnel. 限制操作人员的特定访问
  • D、Job rotation of people through different assignments. 通过人员的工作轮换

相关考题:

共用题干Lifetime Employment in Japanese CompaniesIn most large Japanese companies,there is a policy of lifetime employment.What this means is that when people leave school or university to join an enterprise,they can expect to remain with that organization until they retire.In effect,the employee gets job security for life,and can only be fired for serious mistakes in work.Even in times of business recession,he or she is free from the fear of being laid off.One result of this practice is that the Japanese worker identifies closely with his company and feels strong loyalty to it.By working hard for the company,he believes he is safeguarding his own future.It is not surprising that devotion to one's company is considered a great virtue in Japan.A man is often prepared to put his firm's interests before those of his immediate family.The job security guaranteed by this system influences the way employees approach their work.They tend to think in terms of what they can achieve throughout their career.This is because they are not judged on how they are performing during a short period of time.They can afford to take a longer perspective than their western counterparts.This marriage between the employee and the company-the consequence of lifetime employment-may explain why Japanese workers seem positively to love the products their company is producing and why they are willing to stay on after work,for little overtime pay,to participate in earnest discussions about the quality control of their products.Lifetime employment influences one's career options.A:Right B:Wrong C:Not mentioned

共用题干Lifetime Employment in Japanese CompaniesIn most large Japanese companies,there is a policy of lifetime employment.What this means is that when people leave school or university to join an enterprise,they can expect to remain with that organization until they retire.In effect,the employee gets job security for life,and can only be fired for serious mistakes in work.Even in times of business recession,he or she is free from the fear of being laid off.One result of this practice is that the Japanese worker identifies closely with his company and feels strong loyalty to it.By working hard for the company,he believes he is safeguarding his own future.It is not surprising that devotion to one's company is considered a great virtue in Japan.A man is often prepared to put his firm's interests before those of his immediate family.The job security guaranteed by this system influences the way employees approach their work.They tend to think in terms of what they can achieve throughout their career.This is because they are not judged on how they are performing during a short period of time.They can afford to take a longer perspective than their western counterparts.This marriage between the employee and the company-the consequence of lifetime employment-may explain why Japanese workers seem positively to love the products their company is producing and why they are willing to stay on after work,for little overtime pay,to participate in earnest discussions about the quality control of their products.In Japan one's future is guaranteed through hard work.A:Right B:Wrong C:Not mentioned

共用题干Lifetime Employment in Japanese CompaniesIn most large Japanese companies,there is a policy of lifetime employment.What this means is that when people leave school or university to join an enterprise,they can expect to remain with that organization until they retire.In effect,the employee gets job security for life,and can only be fired for serious mistakes in work.Even in times of business recession,he or she is free from the fear of being laid off.One result of this practice is that the Japanese worker identifies closely with his company and feels strong loyalty to it.By working hard for the company,he believes he is safeguarding his own future.It is not surprising that devotion to one's company is considered a great virtue in Japan.A man is often prepared to put his firm's interests before those of his immediate family.The job security guaranteed by this system influences the way employees approach their work.They tend to think in terms of what they can achieve throughout their career.This is because they are not judged on how they are performing during a short period of time.They can afford to take a longer perspective than their western counterparts.This marriage between the employee and the company-the consequence of lifetime employment-may explain why Japanese workers seem positively to love the products their company is producing and why they are willing to stay on after work,for little overtime pay,to participate in earnest discussions about the quality control of their products.The Japanese worker is fond of his company's product because of the close link between him and his company.A:Right B:Wrong C:Not mentioned

共用题干Lifetime Employment in Japanese CompaniesIn most large Japanese companies,there is a policy of lifetime employment.What this means is that when people leave school or university to join an enterprise,they can expect to remain with that organization until they retire.In effect,the employee gets job security for life,and can only be fired for serious mistakes in work.Even in times of business recession,he or she is free from the fear of being laid off.One result of this practice is that the Japanese worker identifies closely with his company and feels strong loyalty to it.By working hard for the company,he believes he is safeguarding his own future.It is not surprising that devotion to one's company is considered a great virtue in Japan.A man is often prepared to put his firm's interests before those of his immediate family.The job security guaranteed by this system influences the way employees approach their work.They tend to think in terms of what they can achieve throughout their career.This is because they are not judged on how they are performing during a short period of time.They can afford to take a longer perspective than their western counterparts.This marriage between the employee and the company-the consequence of lifetime employment-may explain why Japanese workers seem positively to love the products their company is producing and why they are willing to stay on after work,for little overtime pay,to participate in earnest discussions about the quality control of their products.Lifetime employment in the Japanese company perhaps means that the employee can make serious mistakes in work.A:Right B:Wrong C:Not mentioned

共用题干Lifetime Employment in Japanese CompaniesIn most large Japanese companies,there is a policy of lifetime employment.What this means is that when people leave school or university to join an enterprise,they can expect to remain with that organization until they retire.In effect,the employee gets job security for life,and can only be fired for serious mistakes in work.Even in times of business recession,he or she is free from the fear of being laid off.One result of this practice is that the Japanese worker identifies closely with his company and feels strong loyalty to it.By working hard for the company,he believes he is safeguarding his own future.It is not surprising that devotion to one's company is considered a great virtue in Japan.A man is often prepared to put his firm's interests before those of his immediate family.The job security guaranteed by this system influences the way employees approach their work.They tend to think in terms of what they can achieve throughout their career.This is because they are not judged on how they are performing during a short period of time.They can afford to take a longer perspective than their western counterparts.This marriage between the employee and the company-the consequence of lifetime employment-may explain why Japanese workers seem positively to love the products their company is producing and why they are willing to stay on after work,for little overtime pay,to participate in earnest discussions about the quality control of their products.All the Japanese company's products have high quality and lower price.A:Right B:Wrong C:Not mentioned

The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB、On all client computers, implement logon auditing for all user account logonsC、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD、On all domain controllers, implement logon auditing for all user account logons

The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()A、intrusion protectionB、identityC、secure connectivityD、security management

Operation security requires the implementation of physical security to con-trol which of the following? 操作安全要求对下列哪项实施物理安全控制?()A、evacuation procedures 撤离步骤B、incoming hardware 硬件搬入C、contingency conditions 应急条件D、unauthorized personnel access 未经授权的人员访问

In addition to Human Resources, with what company function must the collection of physical evidence be coordinated if an employee is suspected? 当一个员工受到怀疑时,除了人力资源部门,哪个公司职能应协作收集物理证据?()A、Industrial Security 工业安全B、Legal 法务C、Public Relations 公共关系D、External Audit Group 外部审计团体

Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A、The cell phone should require a password after a set period of inactivity.B、The cell phone should only be used for company related emails.C、The cell phone data should be encrypted according to NIST standards.D、The cell phone should have data connection abilities disabled.

Which of the following would be used to monitor unauthorized access to data files?()A、Performance Log and AlertsB、Event ViewerC、Security Configuration and AnalysisD、IP Security Monitor

Your company has a mix of employees and contractors. Contractor usernames always begin with"con-"; employee usernames never begin with "con-". You need to give employees access to allresources and give contractors access to a limited set of resources. Employee and contractor roles have been created with the appropriate access privileges, and the realm is set to merge settings for all assigned roles. Which role mapping ruleset would result in the correct access privileges being assigned?()A、username="*" - Employee-role Stop username="con-*" - Contractor-roleB、username="*" - Employee-role username="con-*" - Contractor-role StopC、username="con-*" - Contractor-role Stop username="*" - Employee-roleD、username="con-*" - Contractor-role username="*" - Employee-role Stop

Your company uses Network Access Protection (NAP) to enforce policies on client computers taht connect to the network. Client computers run Windows Vista. A Group Policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and Critical must be applied before client computers can access network resources. You need to ensure that client computers meet the company policy requirement. What should you do()A、 Enable automatic updates on each clientB、 enable the Security Center on each clientC、 Quarantine clients that do nto have all availible security updates installedD、 Disconnect the remote connection until the required updates are installed.

You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.The organization contains 1,200 mailboxes with an average size of 700 MB.Company.com employees make use of Microsoft Office Outlook 2010 or Outlook Web App to access their email.Company.com employees who run Microsoft Office Outlook 2010 are configured to make use of the Cached Exchange Mode.During the course of the day you receive an instruction from the CIO to devise a mailbox solution for the organization.Management wants you to make sure that administrators are able to search and locate any message.You should also ensure that the size of the offline store (OST) for every employee is decreased as well as providing access to e-mail messages using Outlook 2010 or Outlook Web App. What should you do?()A、You should consider having a second disabled user account as well as second mailbox created for every employee.Thereafter the journal rules should be configured in order to journal all the messages for every employee to the second mailbox of the employees.B、You should consider having a Personal Archive created for every employee.Then a retention policy should be created.C、Thereafter employees should be instructed to compact the OST file.D、You should consider having a new disabled user account as well as a new mailbox named Journaling Mailbox created.Thereafter journal rules should be configured in order to journal all the messages for employees to the Journaling Mailbox.E、You should consider having a personal folder (PST) file created for every employee.Then the PST files should be stored on the network share.Thereafter employees should be instructed to compact the OST file.

You have an enterprise subordinate certification authority (CA). The CA issues smart card logon  certificates.     Users are required to log on to the domain by using a smart card. Your company’s corporate  security policy states that when an employee resigns, his ability to log on to the network must be  immediately revoked.     An employee resigns. You need to immediately prevent the employee from logging on to the  domain.     What should you do()A、Revoke the employee’s smart card certificate.B、Disable the employee’s Active Directory account.C、Publish a new delta certificate revocation list (CRL).D、Reset the password for the employee’s Active Directory account.

Your company uses Windows Update to download and install security updates on client computers. When Microsoft releases a security update, you have the following requirements:   Establish which client computers require the security update.   Identify what changes will occur as a result of the security update.  Identify which applications might be affected by the security update.    You need to select the appropriate tool to detect application-compatibility issues.   What should you do?()A、Use the Inventory Collector.B、Use the Setup Analysis Tool.C、Use the Update Compatibility Evaluator.D、Use the Windows Compatibility Evaluator.

You need to design a Security strategy for the wireless network at all resort locations.What should you do?()A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesB、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationC、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksD、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()A、The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.B、The best option is to set up a content filtering feature to comply with the Company.com security policy.C、The best option is to create a transport rule to comply with the Company.com security policy.D、The best option is to set up a sender reputation feature to comply with the Company.com security policy.

You are a security administrator for your company. The network consists of three Active Directory domains. All Active Directory domains are running at a Windows Server 2003 mode functionality level.    Employees in the editorial department of your company need access to resources on file servers that are in each of the Active Directory domains. Each Active Directory domain in the company contains at least one editorial department employee user account.    You need to create a single group named Company Editors that contains all editorial department employee user accounts and that has access to the resources on file server computers.  What should you do?()A、 Create a global distribution group in the forest root domain and name it Company Editors.B、 Create a global security group in the forest root domain and name it Company Editors.C、 Create a universal distribution group in the forest root domain and name it Company Editors. D、 Create a universal security group in the forest root domain and name it Company Editors.

You work as the enterprise exchange administrator at company.com.the company.com network consists of a single active directory domain named company.com.company.com has an exchange server 2010 organization.a new company.com security policy prohibits the employees to send certain words in internal e-mail communications.what should you do?()A、the best option is to change the properties of a send connector to comply with the company.com security policy.B、the best option is to set up a content filtering feature to comply with the company.com security policy.C、the best option is to create a transport rule to comply with the company.com security policy.D、the best option is to set up a sender reputation feature to comply with the company.com security policy.

You are a security administrator for your company. The network consists of a single Active  Directory domain. All servers run Windows Server 2003. All client computers run Windows 2000 Professional.   You manage a Windows Server 2003 computer named Server1 that is a domain member server. You use IIS on Server1 to host an Internet Web site. Approximately 4,000 employees of your company connect over the lnternet to access company confidential data on Server1. You control access to data on Server1 by using NTFS file permissions assigned to groups. Different groups are assigned access to different files. Employees must have access only to files that they are assigned access to based on their membership in a group. You enable SSL on Server1 to protect confidential data while it is in transit. You issue each employee an Authenticated Session certificate and store a copy of that certificate with their user account in the Active Directory domain.    You need to ensure that Server1 authenticates users based on possession of their certificate.  What should you do?()A、 Request a Web server certificate from a commercial certification authority (CA).B、 Configure access restrictions based on employee ip address.C、 Enable Digest authentication for Windows domain servers.D、 Configure client certificate mapping.

单选题The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()AOn all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyBOn all client computers, implement logon auditing for all user account logonsCOn all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyDOn all domain controllers, implement logon auditing for all user account logons

单选题What security procedure would force/require an employee to work in collusion with another employee of the company in order to have access to unauthorized da-ta or to defeat the company security mechanisms? 什么样的安全程序会迫使雇员与其他的雇员勾结,来访问未经授权的数据,从而绕过公司的安全机制?()ASecurity personel monitoring of audit logs. 安全人员监控审计日志BPeriodically reviewing subject's access rights. 定期审查主体的访问CLimiting the specific accesses of operations personnel. 限制操作人员的特定访问DJob rotation of people through different assignments. 通过人员的工作轮换

单选题Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()AThe cell phone should require a password after a set period of inactivity.BThe cell phone should only be used for company related emails.CThe cell phone data should be encrypted according to NIST standards.DThe cell phone should have data connection abilities disabled.

单选题Who should DECIDE how a company should approach security and what security measures should be implemented?谁应该决定一个公司应该如何对待安全以及实施什么样的安全措施?()AData owner 数据拥有者BAuditor 审计员CThe information security specialist 信息安全专家DSenior management 高级管理者

单选题Which of the following would be used to monitor unauthorized access to data files?()APerformance Log and AlertsBEvent ViewerCSecurity Configuration and AnalysisDIP Security Monitor

单选题You are a security administrator for your company. The network consists of three Active Directory domains. All Active Directory domains are running at a Windows Server 2003 mode functionality level.    Employees in the editorial department of your company need access to resources on file servers that are in each of the Active Directory domains. Each Active Directory domain in the company contains at least one editorial department employee user account.    You need to create a single group named Company Editors that contains all editorial department employee user accounts and that has access to the resources on file server computers.  What should you do?()A Create a global distribution group in the forest root domain and name it Company Editors.B Create a global security group in the forest root domain and name it Company Editors.C Create a universal distribution group in the forest root domain and name it Company Editors. D Create a universal security group in the forest root domain and name it Company Editors.