The security team has implemented new guidelines on how to handle sensitive information storedon workstations based on a past incident involving information found on donated workstations.Which of the following should be completed by technicians before donating the workstations?()A、Install a new operating systemB、Delete users’ data before donationC、Write the drive with 1’s and 0’s three timesD、Delete all partitions of the hard drive
The security team has implemented new guidelines on how to handle sensitive information storedon workstations based on a past incident involving information found on donated workstations.Which of the following should be completed by technicians before donating the workstations?()
- A、Install a new operating system
- B、Delete users’ data before donation
- C、Write the drive with 1’s and 0’s three times
- D、Delete all partitions of the hard drive
相关考题:
The communication management plan determines the information and communications needs of the stakeholders. In the following statements related to communication management plan. ( ) is false. A. The communication management plan is contained in or is a subsidiary plan of, the project management plan.B. The communication management plan can be formal or informal, highly detailed or broadly framed, and based on the needs of the project.C. The communication manamgement plan organize and summarize the information gathered,and present the results of any analysis as comparedthe performance measurement baseline.D. The communication management plan can include guidelines project status meetings,project team meetings,e-meetines,and e-mail
●The quality management plan should describe how the project management team will implement its quality (73).(73) A. improvementB. controlC. policyD. information
The quality management plan should describe how the project management team will implement its quality(73).A. improvementB. controlC. policyD. information
The quality management plan should describe how the project management team will implement its quality(73).A.improvementB.controlC.policyD.information
While most recent attention in the AI field has been focused on expert system software, AI(66)has also seen dramatic advances. Activity in the past years was characterized by new low-cost, powerful Lisp machines, the introduction of AI workstations, Lisp compilers becoming available for all major professional and engineering workstations, and the personal computer emerging as a(67). tool for expert system development. The next few years will see this technology evolves further.Because the(68)of an AI computer represents a sizable investment, companies should carefully(69)all options that are available as well as have a good idea of what the next generation of systems will offer in order to(70)the optimum system. This publication provides the information necessary to gain this understanding.A.choiceB.readC.importantD.softwareE.hardware
Your company network has 500 client computers that run Windows 7. Your team consists of 20 desktop support technicians. Two technicians troubleshoot a hardware-related performance issue on a computer. The technicians obtain different results by using their own User Defined Data Collector Sets. You need to create a standardized Data Collector Set on a network share that is accessible to your team. What should you create?()A.Event Trace Data Collector SetB.Performance Counter Data Collector SetC.Performance Counter Alert Data Collector SetD.System Configuration Information Data Collector Set
Of the following,______ is not likely found in The Mariners Handbook(NP100).A.navigational hazards and buoyage,meteorological data,details of pilotage,regulations,port facilities and guides to major port entryB.information on chartsC.information on operational information and regulationD.information on tides,currents and characteristics of the sea
If a teacher attempts to implement the top-down model to teach listening, he/she is likely to present __________.A.new words after playing the tapeB.new words before playing the tapeC.background information after playing the tapeD.background information before playing the tape
If a teacher attempts to implement the top-down model to teach listening, he is likely to present_______A.new words after playing the tapeB.new words before playing the tapeC.background information after playing the tapeD.background information before playing the tape
( )is not included in Information Security Risk Assessment Process.A.Establishing information security risk criteriaB.Identifying the information security risksC.Formulating an information security risk treatment planD.Analysing the information security risk
The term computer describes a device made up of a combination of electronic components.By itself, a computer has no ( ) and is referred to as hardware, which means simply the physical equipment. The hardware can't be used until it is connected to other elements, all of which constitute the six parts of a computer-based information system,hardware,software,data/information, people, procedures and communications.A system is defined as a collection of related components that (请作答此空) to perform a task in order to accomplish a goal. Any organization that uses information technology will have a computer-based information system to provide managers (and various categories of employees with the appropriate kind of information to help them make decisions.Systems analysis and design is to ascertain how a system works and then take steps to make it ( ) Often, a system approach is used to define, describe, and solve a problem or to meet a(an)( )From time to time, organizations need to ( )their information systems, in, responseto new marketing' opportunities, modified government regulations, the introduction .of new technology, merger with another company, or other developments. When change is needed, the time is ripe for applying the principles of systems analysis and design.A.interactB.workC.connectD.change
The communication management plan determines the information and communications needs of the stakeholders. In the following statements related to communication management plan. ( ) is false. A.The communication management plan is contained in or is A.subsidiary plan of, the project management plan. B.The communication management plan can be formal or informal, highly detaileD.or broadly framed, and based on the needs of the project. C.The communication manamgement plan organize and summarize the information gathered, and present the results of any analysis as comparedthe performance measurement baseline. D.The communication management plan can include guidelines project status meetings, project team meetings, e-meetines, and e-mail.
The communication management plan determines the information and communications needs of the stakeholders. In the following statements related to communication management plan. ( ) is false. A、The communication management plan is contained in or is a subsidiary plan of, the project management plan.B、The communication management plan can be formal or informal, highly detailed or broadly framed, and based on the needs of the project.C、The communication manamgement plan organize and summarize the information gathered,and present the results of any analysis as comparedthe performance measurement baseline.D、The communication management plan can include guidelines project status meetings,project team meetings,e-meetines,and e-mail
Your web application uses a simple architecture in which servlets handle requests and then forward to aJSP using a request dispatcher. You need to pass information calculated by the servlet to the JSP;furthermore, that JSP uses a custom tag and must also process this information. This information mustNOT be accessible to any other servlet, JSP or session in the webapp. How can you accomplish this goal?()A、Store the data in a public instance variable in the servlet.B、Add an attribute to the request object before using the request dispatcher.C、Add an attribute to the context object before using the request dispatcher.D、This CANNOT be done as the tag handler has no means to extract this data.
Which of the following is the MOST secure and efficient way to dispose of rewritable DVD media containing sensitive information?()A、Media should be erasedB、Media should be shreddedC、Media should be exposed to UVD、Media should be formatted
A technician works in a datacenter that is shared by multiple companies. The technician isconcerned with preventing the theft of proprietary information by other technicians with access to the datacenter. Which of the following is the BEST way to prevent data theft in this scenario?()A、MantrapsB、Two-factor authenticationC、Security personnelD、Locked rack doors
A technician is troubleshooting a workstation that has the wrong time information. All workstations should be pointing to a central NTP server. Which of the following locations would the technician check to investigate error messages related to this issue?()A、IIS logB、Application logC、System logD、Security log
A technician is sent out to a client’s office to solve an issue involving a machine which has numerous Windows XP service failures upon startup. Which of the following would be the FIRST place to check for information on this?()A、Event ViewerB、MSCONFIGC、Services MMCD、Group Policy Editor
An administrator was asked to log information on possible security breaches on a server. To which file should additional entries be added to capture this information()A、/var/adm/sulogB、/etc/syslog.confC、/etc/security/sysck.cfgD、/etc/security/syslog.conf
The pSeries technical specialist has been invited to a briefing on the latest POWER technology as a representative of their team. What should the specialist offer to do upon return from class in order to best prepare the rest of the team for the introduction of the new technology?()A、Archive the materials in the team’s library.B、Act as the sole technical resource for the team.C、Summarize the information and make it available to the team.D、Evaluate the class and recommend attendance to other team members.
A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()A、/var/adm/sulogB、/etc/syslog.confC、/etc/security/sysck.cfgD、/etc/security/login.cfg
Your company network has 500 client computers that run Windows 7. Your team consists of 20 desktop support technicians. Two technicians troubleshoot a hardware-related performance issue on a computer. The technicians obtain different results by using their own User Defined Data Collector Sets. You need to create a standardized Data Collector Set on a network share that is accessible to your team. What should you create?()A、Event Trace Data Collector SetB、Performance Counter Data Collector SetC、Performance Counter Alert Data Collector SetD、System Configuration Information Data Collector Set
A technician is servicing the Human Resource director’s computer which contains payroll software and salary information. Which of the following should the technician do to ensure confidentiality of the payroll information?()A、Backup the confidential data to the technician’s USB drive to ensure nothing is accidently deleted.B、Uninstall the payroll software to ensure confidentiality.C、Have the director remove sensitive data before the computer will be repaired.D、Perform needed repairs while avoiding sensitive data.
单选题You are the administrator of a Microsoft Windows Server 2003 computer named SQL1. SQL1 runs SQL Server 2005 and is a member of a Microsoft Active Directory domain named Contoso.com. The domain is configured with all of the default settings. Several members of the information security team have requested access to SQL1. The information security team uses the Microsoft Windows XP Professional, Linux, and Macintosh operating systems to perform vulnerability assessments. The information security team members ask you to create two new logon accounts for their use. They would like the logon accounts to have the following user names and passwords: User name/password for first account: pentest/P@ssw0rdUser name/password for second account: hacktest/password You need to provide the information security team with the requested access to SQL1. Which Transact-SQL script should you use?()ACREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password'BCREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password',CHECK_POLICY = OFFCCREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password'[HASHED]DCREATE LOGIN [CONTOSO/pentest]FROM WINDOWS CREATE LOGIN [CONTOSO/hacktest]FROM WINDOWS
单选题Who should DECIDE how a company should approach security and what security measures should be implemented?谁应该决定一个公司应该如何对待安全以及实施什么样的安全措施?()AData owner 数据拥有者BAuditor 审计员CThe information security specialist 信息安全专家DSenior management 高级管理者
单选题Stephen Smith feels thatAthe security of information on the network used to be a worry.Ball the data should be stored on the same system.Cthe company’s computer-based information is well-protected.
单选题A technician is troubleshooting a workstation that has the wrong time information. All workstations should be pointing to a central NTP server. Which of the following locations would the technician check to investigate error messages related to this issue?()AIIS logBApplication logCSystem logDSecurity log