What is a "system high" security policy?什么是一个“系统高”的安全策略?()A、A system where all users are cleared to view the most highly classified data on the system.系统上的所有用户被许可查看最高级别的数据B、A system that contains only data of one security classification.只包含一个安全级别的数据C、A system with data that contains only data of the highest security classification.只包含最高安全级别的数据D、A system that uses a Multi-Level Security Policy to separate the highly classified data from the other data residing on the system.使用多级安全策略去划分高级别数据和其他数据。

What is a "system high" security policy?什么是一个“系统高”的安全策略?()

  • A、A system where all users are cleared to view the most highly classified data on the system.系统上的所有用户被许可查看最高级别的数据
  • B、A system that contains only data of one security classification.只包含一个安全级别的数据
  • C、A system with data that contains only data of the highest security classification.只包含最高安全级别的数据
  • D、A system that uses a Multi-Level Security Policy to separate the highly classified data from the other data residing on the system.使用多级安全策略去划分高级别数据和其他数据。

相关考题:

在ASP.NET应用程序中访问SqlServer数据库时,需要导入的命名空间为()。A.System.Data.OracleB.System.Data.SqlClientC.System.Data.ODBCD.System.Data.OleDB

SR7750查看系统已经打开的端口命令是()A、Show system connectionB、Show system portC、show running portD、Show system security

访问Oracle数据库需要使用的命名空间是()。A、System.Data.OleDbB、System.Data.SqlClientC、System.Data.OracleD、System.Data.Odbc

ADO.NET使用()命名空间的类访问SQL Server数据库中的数据。A、System.Data.OleDbB、System.Data.SqlClientC、System.Xml.SerializationD、System.IO

You need to design a monitoring strategy to meet business requirements for data on servers in the production department. What should you do?()A、Use the Microsoft Baseline Security Analyzer (MBSA) to scan for Windows vulnerabilities on all servers in the production departmentB、Run Security and Configuration Analysis to analyze the security settings of all servers in the production departmentC、Enable auditing for data on each server in the production department. Run System Monitor on all servers in the production department to create a counter log that tracks activity for the Objects performance objectD、Create a Group Policy Object (GPO) that enables auditing for object access and link it to the product department’s Servers OU. Enable auditing for data on each server in the production department

数据采集系统(Data Acquisition System,简称DAS)

在ASP.NET应用程序中访问SqlServer数据库时,需要导入的命名空间为()A、System.Data.OracleB、System.Data.SqlClientC、System.Data.ODBCD、System.Data.OleDB

For the following attempts, which one is to ensure that no one employee becomes a pervasive securitythreat, that data can be recovered from backups, and that information system changes do not compromisea system’s security?()A、Strategic security planningB、Disaster recoveryC、Implementation securityD、Operations security

If an operating system permits shared resources such as memory to be used sequentially by multiple users/application or subjects without a refresh of the objects/memory area, what security problem is most likely to exist? 如果操作系统允许共享资源,内存顺序使用无刷新的对象/存储区由多个用户/应用程序或主题,什么是最可能存在的安全问题?()A、disclosure of residual data. 残余数据的披露B、unauthorized obtaining of a privileged execution state. 取得未经授权的特权执行。C、data leakage through covert channels. 通过秘密渠道的数据泄漏D、denial of service through a deadly embrace. 拒绝服务攻击通过一个致命的死锁

An administrator is planning to bring a newly purchased server online. Which of the following should the administrator do FIRST?()A、Follow the pre-installation plan and procedures.B、Review the system logs to check for errors.C、Notify all users that the old system will be taken offline.D、Apply all security updates to the system.

A customer has security concerns about classified local data being compromised if the laptop isstolen. The customers laptop has Windows 2000 utilizing the FAT16 file system. Which of the following actions should be taken?()A、Upgrade the operating system to Windows XP Home.B、Have the customer convert to NTFS and enable data encryption.C、Tell the customer that a laptop should not be used for classified data.D、Configure the wireless adapter to only connect to secure networks.

An administrator is planning to bring a newly purchased server online. Which of the following should the administrator do FIRST?()A、 Follow the pre-installation plan and procedures.按照预先安装计划和程序。B、 Review the system logs to check for errors.C、 Notify all users that the old system will be taken offline.D、 Apply all security updates to the system.

A customer is planning to migrate a financial application to a 12-way p5-570 system with 96GB of memory.  The application data is stored on an ESS Model 800 attached to a p670 server with AIX 5.2.  They will have a short outage window to perform the data migration.  What is the quickest way to move all the data stored on the attached ESS from the p670 to the new p5-570?()A、Use rsync to synchronize the data across servers.B、Use exportvg and importvg to move the data to the target system.C、Use NFS to copy the data from the source system to the target system.D、Backup the data from the source system and restore to the target system.

In AIX 5L and later, the operating system supports the /proc filesystem. What would be the best description of the /proc filesystem?()A、 It is a pseudo filesystem that maps processes and kernel data structures to corresponding files.B、 It is a JFS mounted filesystem that provides an exact representation of what is happening to a proces at a single and discrete point of time.C、 It is a JFS mounted filesystem that maps processes and read-only files related to these processes.D、 It is a pseudo filesystem that contains data that represents the state of the parent processes (but not their threads) in a system.

A company just hired a new plant maintenance manager, and they are concerned about the number of corrupt asset records in the present system. In future they want to prevent this from happening. When implementing the new solution, what is recommended?()A、All maintenance personnel have full access to all records.B、All maintenance personnel have read-only access to all data. C、Only a very limited number of personnel have full access to static data records, but all maintenance personnel are able to enter work order data.D、Maintenance personnel should not be using the system, and should only write entries on printed work orders and hire input clerks to enter these into the system.

The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()  A、 On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.B、 Use C-SPOC to synchronize the password files between cluster nodes.C、 On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.D、 On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.

When performing an incomplete recover of the whole database, which data files must you restore? ()A、Only the damaged or lost data files.B、All of the data files of the database.C、Only the data files belonging to the SYSTEM tablespace.D、The data files belonging to the SYSTEM tablespace and the damaged or lost data files.

A redaction policy was added to the SAL column of the SCOTT.EMP table: All users have their default set of system privileges. For which three situations will data not be redacted?()A、SYS sessions, regardless of the roles that are set in the sessionB、SYSTEM sessions, regardless of the roles that are set in the sessionC、SCOTT sessions, only if the MGR role is set in the sessionD、SCOTT sessions, only if the MGR role is granted to SCOTTE、SCOTT sessions, because he is the owner of the tableF、SYSTEM session, only if the MGR role is set in the session

Two data files have been deleted at the operating system level by accident. Your database is running in ARCHIVELOG mode and online backups are taken nightly. One of the data files that has been deleted belongs to the USERS tablespace on the other belongs to the SYSTEM tablespace. How can you recover from this situation?()A、Shut down the database, restore the two data files and then start up the database. B、Take the system and users tablespace offline, restore the two data files, recover the two datafiles, and then bring the SYSTEM and USERS tablespaces online. C、Shut down the database, restore the two data files, start up the database in MOUNT mode, recover the two data files, and then alter the database open. D、Take the SYSTEM and USERS tablespaces offline, recover the two datafiles and then bring the SYSTEM and USERS tablespaces online.

You are the senior systems engineer for your company. The network consists of a single Active Directory domain.  All servers run Windows Server 2003. Client computers in the sales department run Windows NT Workstation 4.0 with the Active Directory Client Extensions software installed. All other client computers run Windows XP Professional. All servers are located in an organizational unit (OU) named Servers. All client computers are located in an OU named Desktops.   Four servers contain confidential company information that is used by users in either the finance department or the research department. Users in the sales department also store files and applications on these servers. The company’s written security policy states that for auditing purposes, all network connections to these resources must require authentication at the protocol level. The written security policy also states that all network connections to these resources must be encrypted. The company budget does not allow for the purchase of any new hardware or software. The applications and data located on these servers may not be moved to any other server in the network.   You define and assign the appropriate permissions to ensure that only authorized users can access the resources on the servers.   You now need to ensure that all connections made to these servers by the users in the finance department and in the research department meet the security guidelines stated by the written security policy. You also need to ensure that all users in the sales department can continue to access their resources.   Which two actions should you take?()A、 Create a new Group Policy object (GPO) and link it to the Servers OU. Enable the Secure Server (Require Security) IPSec policy in the GPO.B、 Create a new Group Policy object (GPO) and link it to the Servers OU. Enable the Server (Request Security) IPSec policy in the GPO.C、 Create a new Group Policy object (GPO) and link it to the Desktops OU. Enable the Client (Respond only) IPSec policy in the GPO.D、 Create a new Group Policy object (GPO). Edit the GPO to enable the Registry Policy Processing option and the IP Security Policy Processing option. Copy the GPO files to the Netlogon shared folder.E、 Use System Policy Editor to open the System.adm file and enable the Registry Policy Processing option and the IP Security Policy Processing option. Save the system policy as NTConfig.pol.

单选题What is a "system high" security policy?什么是一个“系统高”的安全策略?()AA system where all users are cleared to view the most highly classified data on the system.系统上的所有用户被许可查看最高级别的数据BA system that contains only data of one security classification.只包含一个安全级别的数据CA system with data that contains only data of the highest security classification.只包含最高安全级别的数据DA system that uses a Multi-Level Security Policy to separate the highly classified data from the other data residing on the system.使用多级安全策略去划分高级别数据和其他数据。

单选题A company just hired a new plant maintenance manager, and they are concerned about the number of corrupt asset records in the present system. In future they want to prevent this from happening. When implementing the new solution, what is recommended?()AAll maintenance personnel have full access to all records.BAll maintenance personnel have read-only access to all data. COnly a very limited number of personnel have full access to static data records, but all maintenance personnel are able to enter work order data.DMaintenance personnel should not be using the system, and should only write entries on printed work orders and hire input clerks to enter these into the system.

单选题An administrator is planning to bring a newly purchased server online. Which of the following should the administrator do FIRST?()AFollow the pre-installation plan and procedures.BReview the system logs to check for errors.CNotify all users that the old system will be taken offline.DApply all security updates to the system.

多选题You are the senior systems engineer for your company. The network consists of a single Active Directory domain.  All servers run Windows Server 2003. Client computers in the sales department run Windows NT Workstation 4.0 with the Active Directory Client Extensions software installed. All other client computers run Windows XP Professional. All servers are located in an organizational unit (OU) named Servers. All client computers are located in an OU named Desktops.   Four servers contain confidential company information that is used by users in either the finance department or the research department. Users in the sales department also store files and applications on these servers. The company’s written security policy states that for auditing purposes, all network connections to these resources must require authentication at the protocol level. The written security policy also states that all network connections to these resources must be encrypted. The company budget does not allow for the purchase of any new hardware or software. The applications and data located on these servers may not be moved to any other server in the network.   You define and assign the appropriate permissions to ensure that only authorized users can access the resources on the servers.   You now need to ensure that all connections made to these servers by the users in the finance department and in the research department meet the security guidelines stated by the written security policy. You also need to ensure that all users in the sales department can continue to access their resources.   Which two actions should you take?()ACreate a new Group Policy object (GPO) and link it to the Servers OU. Enable the Secure Server (Require Security) IPSec policy in the GPO.BCreate a new Group Policy object (GPO) and link it to the Servers OU. Enable the Server (Request Security) IPSec policy in the GPO.CCreate a new Group Policy object (GPO) and link it to the Desktops OU. Enable the Client (Respond only) IPSec policy in the GPO.DCreate a new Group Policy object (GPO). Edit the GPO to enable the Registry Policy Processing option and the IP Security Policy Processing option. Copy the GPO files to the Netlogon shared folder.EUse System Policy Editor to open the System.adm file and enable the Registry Policy Processing option and the IP Security Policy Processing option. Save the system policy as NTConfig.pol.

单选题A customer has security concerns about classified local data being compromised if the laptop isstolen. The customers laptop has Windows 2000 utilizing the FAT16 file system. Which of the following actions should be taken?()AUpgrade the operating system to Windows XP Home.BHave the customer convert to NTFS and enable data encryption.CTell the customer that a laptop should not be used for classified data.DConfigure the wireless adapter to only connect to secure networks.

单选题A customer is planning to migrate a financial application to a 12-way p5-570 system with 96GB of memory.  The application data is stored on an ESS Model 800 attached to a p670 server with AIX 5.2.  They will have a short outage window to perform the data migration.  What is the quickest way to move all the data stored on the attached ESS from the p670 to the new p5-570?()AUse rsync to synchronize the data across servers.BUse exportvg and importvg to move the data to the target system.CUse NFS to copy the data from the source system to the target system.DBackup the data from the source system and restore to the target system.

单选题The user base of a three-node cluster has increased. In order to add clustered users to all nodes, which of the following steps should be performed?()A On one of the nodes,add the users via C-SPOC ’Add a User to the Cluster’smit menu.B Use C-SPOC to synchronize the password files between cluster nodes.C On all of the nodes,add the users to the /etc/passwd and system security files,and then synchronize the cluster.D On one of the nodes,add the users to the /tec/passwd and system security files,add home directories,and use cron to automate the movement of system security files between nodes.