单选题Who is ultimately responsible for the security of a computer based information system within any organization?在任何机构内,哪一项是计算机信息系统安全的根本原因()Aan operational issue.操作问题Ba management issue.管理问题Ca training issue.培训问题Da technical issue.技术问题

单选题
Who is ultimately responsible for the security of a computer based information system within any organization?在任何机构内,哪一项是计算机信息系统安全的根本原因()
A

an operational issue.操作问题

B

a management issue.管理问题

C

a training issue.培训问题

D

a technical issue.技术问题


参考解析

解析: 暂无解析

相关考题:

In the project environment, the individual ultimately responsible for quality control is:A . The line workers who must strive "to do things right the first time" to avoid quality problems.B . the company's quality control manager who must work with the project members to ensure the quality control program is effective.C . The head of the production department who retains ultimate quality control responsibility for all the company's projects.D . The project manager who has ultimate responsibility for the entire project.E . the customer who must ensure that he is receiving a quality product from the vendor.

41 In the project environment, the individual ultimately responsible for quality control is:A. The line workers who must strive "to do things right the first time" to avoid quality problems. B. the company's quality control manager who must work with the project members to ensure the quality control program is effective.C. The head of the production department who retains ultimate quality control responsibility for all the company's projects.D. The project manager who has ultimate responsibility for the entire project.E.the customer who must ensure that he is receiving a quality product from the vendor

我是安保部经理, 将协助这次安保工作A.I’m a manager of the enterprise, who will assist you in this security departmentB.I’m a manager of the security department. , who will assist you in this security workC.The security manager who will assist you in this security work, is on the wayD.The security work will be assisted by the manager of the security department

Who is responsible _______ the education of the children?. A. toB. onC atD.for

Virus Security Software is designed to detect, eliminate or quarantine computer viruses before they are able to harm a computer or server networked system.A.AntiB.InvadeC.InroadD.Aggression

Who is the______ (own)of this computer?

The government who ______ responsible for this event attempted to find a solution.A. wereB. wasC. areD. is

The police officer is determining who is going to be responsible()the traffic accident.A. forB. onC. in

Ship security officer is __________.A.the guard posted on the vesselB.a person responsible for implementation of international ship and port security code on board shipC.the master of the vesselD.All the above

Who is responsible for the development of the ship security plan?________.A.The company security officerB.The classification societyC.The port facility security officerD.The ship security officer

●The (75)is designed specifically as a security system for preventing unauthorized communications between one computer network and another computer network.(75)A.firewallB.protocolC.hackerD.virus

UCLA had taken away all Social Security numbers from common usage to ensure the computer security.

He's responsible()the central computer system.A、inB、forC、of

You have a share on your local computer. This share contains some sensitive applications in theform of .exe files. You want to audit the users who are trying to execute these programs. What should you do?()A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'.C、Use Windows Explorer to turn on auditing for the specific files. D、Have the administrator for domains log you on as an administrator and enable auditing for a  specific file.E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.F、Allow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.

Who is ultimately responsible for the security of a computer based information system within any organization?在任何机构内,哪一项是计算机信息系统安全的根本原因()A、an operational issue.操作问题B、a management issue.管理问题C、a training issue.培训问题D、a technical issue.技术问题

Who is responsible for authorizing closure of the project?()A、Project ManagerB、StakeholderC、CustomerD、Executive Sponsor

You need to design a permission structure for registry objects that enables the legacy application at the resorts to run. Your solution must comply with the written security policy.  What should you do?()A、Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the legacy application, Use the GPO to give the Domain Users security group full control on the partitions of the registry that the legacy application usesB、Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the legacy application. Use the GPO to give the Domain Users security group full control on the HKEY_USERS partition of the registryC、Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the Legacy application. Use the GPO to make all users who require access to the application members of Local Administrators group on each computerD、Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the Legacy application. Use the GPO to give all users who require access to the application full control for the Ntuser.dat file

You have a combined Windows 2000 and Windows 98 network that contain sensitive data. You want to utilize as many new Windows 2000 security features as possible. You want to customize a security policy on each computer to ensure that data is kept confidential and secured. Allcomputers must still be able to communicate with each other over the network. What should you do?()A、Use the security configuration and analysis console to improve the HISECWS security  template file.B、Use the local computer policy to disable the access this computer from the network option.C、Use SECEDIT to reconfigure the computer default security settings to not allow anonymous  access to the computer.D、Create a policy that excludes write access to the windows 2000 computers then apply the  policy to all non-windows 2000 computers.E、None of the above, Windows 9X systems cannot be secured using security template files.

You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()A、Use secedit.exe to refresh the security policy.B、Use the local computer policy to configure the local security policy.C、Use security configuration and analysis to support the security files as a .pol file.D、Use computer management to configure the security policy setting.

You upgrade five computers in the Finance organizational unit (OU) from Windows NT Workstation 4.0 to Windows 2000 Professional. The computers are used by members of the Finance OU to run financial Applications. All five computers are configured to have the default security settings. A user named Helene reports that she can no longer log run the financial applications on her Windows 2000 Professional computer. Prior to the upgrade, Helene was able to run the financial applications on her computer. Helene is a member of the local Users group. You want the financial applications to run on her computer. What should you do?()A、 Use Computer Management to configure separate memory space for each financial application on Helene’s computer.B、 Use Security Templates to edit the Security Policy to include the financial application onHelene’s computer. Then add Helene’s user account to the Power Users group on Helene’s computer.C、 Use Security Configuration and Analysis to reconfigure the default security policy .inf to allow financial  applications to run on Helene’s computer.D、 Use Secedit.exe to apply the Compatws.inf security template on Helene’s Security Policy toloosen the permissions for the local Users group on Helene’s computer.

单选题()means the person on board the ship, accountable to the master, designated by the Company as responsible for the security of the ship, including implementation and maintenance of the ship security plan and for liaison with the company security officer and port facility security officers.AShip security officerBCompany security officerCPort facility security officerDPSC officer

单选题He's responsible()the central computer system.AinBforCof

单选题Who is responsible for the voyage plan?()AThe person who has done the planningBThe masterCThe navigation officerDThe owner

单选题()means the person designated as responsible for the development, implementation, revision and maintenance of the port facility security plan and for liaison with the ship security officers and company security officers.AShip security officerBCompany security officerCPort facility security officerDPSC officer

单选题You have a share on your local computer. This share contains some sensitive applications in theform of .exe files. You want to audit the users who are trying to execute these programs. What should you do?()ATurn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.BTurn on auditing for objects in the Local Security Policy and Select 'Object Access'.CUse Windows Explorer to turn on auditing for the specific files. DHave the administrator for domains log you on as an administrator and enable auditing for a  specific file.ETurn on auditing for objects in the Local Security Policy and Select 'Account Management'.FAllow only one account at a time to log on to your shared folder. Check the event viewer to  see who logged on.

单选题You have two computers named Computer1 and Computer2 that run Windows 7. You need to ensure thatComputer2 has exactly the same firewall rules as Computer1.  What should you do on Computer1?()ARun Winrm.exe quickconfig.BFrom Windows Firewall with Advanced Security, select Export Policy.CFrom Windows Firewall with Advanced Security, click Inbound Rules and then click Export List.DOpen Local Security Policy. Right-click IP Security Policies on Local Computer and then click Export List.

填空题Who should be responsible for the fault?____ should be responsible for the fault.