A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat()A、Incident responseB、Asset managementC、Patch managementD、Policies and procedures
A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat()
- A、Incident response
- B、Asset management
- C、Patch management
- D、Policies and procedures
相关考题:
Which of the following best summarizes the main idea of the text?[A] The Internet is posing a threat to publishers.[B] A new mode of publication is emerging.[C] Authors welcome the new channel for publication.[D] Publication is rendered easier by online service.
Which of the following best summarizes the main idea of the passage?A.The Internet is posing a threat to publishers.B.A new mode of publication is emerging.C.Authors welcome the new channel for publication.D.Publication is rendered easier by online service.
() seeks to perform. root cause investigation as to what is leading identified trends. A、Problem managementB、Incident managementC、Change managementD、Knowledge management
Which of the following should be updated when new computers are purchased?() A. Asset managementB. Change managementC. Cable managementD. Baselines
Which of the following is the FIRST thing to consider when designing an email retention policy?() A. Local laws and industry regulationsB. Company policies and guidelinesC. Project guidelines given by stakeholdersD. Mail server and backup capacity
A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat() A. Incident responseB. Asset managementC. Patch managementD. Policies and procedures
An administrator needs to implement a security patch policy on the network that adheres to an internal SLA. Which of the following actions BEST achieves this task?() A. Define a test server group, install the patches and if successful schedule installation on production servers.B. Define a test server group, schedule installation on production servers and then install all updates and patches.C. Install the patches during a non-working hour.D. Send an email to all company users and request the best time for installation.
()seeks to perform root cause investigation as to what is leading identified trendsA.Problem managementB.Incident managementC.Change managementD.Knowledge management
Which Service component in Cisco Unified Communications operate phase identifies and solves reoccurring incidents by analyzing incident trends to identify patterns and systemic conditions()A、Problem ManagementB、Incident ManagementC、Change ManagementD、Systems Monitoring
In the operate phase, providing and maintaining reliable, current information about the WLANsystem hardware, software, and applications pertinent to the system’s individual components andattributes is part of which service component?()A、Problem ManagementB、Configuration ManagementC、Incident ManagementD、Change Management
Which of the following should be updated when new computers are purchased?()A、Asset managementB、Change managementC、Cable managementD、Baselines
In the operate phase, providing and maintaining reliable, current information about the wlan system hardware, software,and applications pertinent to the system’s individual components and attributes is part of which service component?()A、problem managementB、configuration managementC、incident managementD、change management
Which service component in the wireless operate phase helps isolate and resolve an incident?()A、change managementB、configuration managementC、incident managementD、acceptance test plan
Which of the following parameter sets must be configured on the Cisco Wireless Location Appliance?()A、Object DefinitionsB、Asset ManagementC、Location ViewsD、Network Connections
Which of the following specifies a set of consistent requirements for a workstation or server?()A、Vulnerability assessmentB、Imaging softwareC、Patch managementD、Configuration baseline
Which of the following is the FIRST thing to consider when designing an email retention policy?()A、 Local laws and industry regulationsB、 Company policies and guidelinesC、 Project guidelines given by stakeholdersD、 Mail server and backup capacity
The company has two thousand servers located around the globe. Which of the following is the BEST method of patch management and deployment?()A、Set all servers to automatically download patches from the manufacturer’s website.B、Install an internal patch management system and deploy from the system.C、Install the patches on each server from a deployment disk.D、RDP into each server, manually download and install the patches.
Which of the following will help protect an operating system from vulnerability?()A、Download free anti-virus programs from the Internet.B、Perform updates from the manufacturers website regularly.C、Using the operating systems email program only to open attachments.D、Monitoring what is displayed on the screen.
Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A、The cell phone should require a password after a set period of inactivity.B、The cell phone should only be used for company related emails.C、The cell phone data should be encrypted according to NIST standards.D、The cell phone should have data connection abilities disabled.
A company is upgrading from DSL to a new T1. When the ISP sends a technician out, the technicianwill terminate the T1 at which of the following locations in the building?()A、Patch panelB、FirewallC、SwitchD、Demarc
A technician is attempting to determine whether a CAT5 patch cord is a straight-through or acrossover. Which of the following is the BEST to use to determine the cord type?()A、Cable testerB、Loopback cableC、MultimeterD、Extension magnet
A company is deploying a new file server to consolidate shares from several legacy servers. Which of the following is the BEST method to ensure that the new file shares are being used?()A、 Setup the new file server and shut down the legacy servers.B、 Remove all the DNS entries for the legacy servers.C、 Create a logon script to remap the old file shares to the new file shares.D、 Go to each users computer, remove all shares and setup the new shares.
An administrator needs to implement a security patch policy on the network that adheres to an internal SLA. Which of the following actions BEST achieves this task?()A、Define a test server group, install the patches and if successful schedule installation on production servers.B、Define a test server group, schedule installation on production servers and then install all updates and patches.C、Install the patches during a non-working hour.D、Send an email to all company users and request the best time for installation.
Which of the following can limit cabling mistakes?()A、Proper labelingB、Asset managementC、Keeping good vendor logsD、Keeping up-to-date repair logs
单选题A new virus is spreading via email and exploits an old vulnerability in a company’s main OS.Which of the following BEST helps to mitigate this type of threat()AIncident responseBAsset managementCPatch managementDPolicies and procedures
单选题Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()AThe cell phone should require a password after a set period of inactivity.BThe cell phone should only be used for company related emails.CThe cell phone data should be encrypted according to NIST standards.DThe cell phone should have data connection abilities disabled.
单选题Which of the following is the FIRST thing to consider when designing an email retention policy?()A Local laws and industry regulationsB Company policies and guidelinesC Project guidelines given by stakeholdersD Mail server and backup capacity