The major technical areas of computer security are usually represented by the initials CIA(71),integrity,and authentication or availability.A.confidentialityB.confidentC.secretD.safety

The major technical areas of computer security are usually represented by the initials CIA(71),integrity,and authentication or availability.

A.confidentiality

B.confident

C.secret

D.safety


相关考题:

Project tradeoffs are usually made by comparing _____ and constraints.ATime, cost, and qualityBTime, risk, and qualityCRisk, quality, and manpower availabilityDCost, quality, and technical performanceECost, quality, and risk

Though the efficiency of the late-20th century desktop computer once () the technical community, the much more advanced personal computer now surpasses the older machines. A、acceleratedB、embarrassedC、definedD、astounded

Virus Security Software is designed to detect, eliminate or quarantine computer viruses before they are able to harm a computer or server networked system.A.AntiB.InvadeC.InroadD.Aggression

● The computer you are using is protected usually by (75) .(75)A. passwordB. keyC. mouseD. USB

One solution to major security problems is ______, which are frequently installed to fix known security holes.A.patchesB.compensationsC.complementsD.additions

Password is a(n)(71)series of characters that enables a user(72)a file, computer or program. On multi - user systems,(73)user must enter his or her password(74)the computer will respond to commands. The password helps ensure that unauthorized users do not access the computer. In addition, data files and programs may require a password.Ideally, the password should be something(75)could guess. In practice, most people choose a password that is easy to remember, such as their name or their initials. This is one reason it is relatively easy to break into most computer system.A.obviousB.secretC.importantD.easy

One solution to major security problems is(71), which are frequently installed to fix known security holes。A.additionsB.compensationsC.patchesD.complements

People usually install(10)to fix known security holes.A.patchesB.compensationsC.complementsD.additions

The computer you are using is protected usually by______.A.passwordB.keyC.mouseD.USB

The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()A. intrusion protectionB. identityC. secure connectivityD. security management

●The (75)is designed specifically as a security system for preventing unauthorized communications between one computer network and another computer network.(75)A.firewallB.protocolC.hackerD.virus

It is true that until very recently the general view was that social security “represented a type of luxury and was essentially anti-economic.” It was seen as merely government expenditure for the needy.

Miao Yue usually_______(play) computer games on weekends.

UCLA had taken away all Social Security numbers from common usage to ensure the computer security.

根据下面资料,回答Today, people all over the world are moving out of small villages in the country to go and live in big, noisy cities. They are moving from the peaceful hills, mountains, fields, rivers and streams of the countryside to the busy world of streets, buildings, traffic and crowds. This movement from rural areas to urban areas has been going on for over two hundred years. In many countries, the main reason why people come to live in towns and cities is work. After one or two large factories have been built in or near a town, people come to find work, and soon an industrial area begins to grow. There is usually a residential area nearby, where the factory workers can live. The families of these workers need schools, hospitals and shops, so more people come to live in the area to provide these services and a city grows. In every major city in the world, there is a business district where the big companies have their main offices. In the United States, this area is usually in the city centre. It is here that you can see the huge skyscraper office blocks. The people who work here often travel a long way to work each day. Many of them live in the suburbs of the city, far away from the industrial area and the city centre. Some suburbs are very pleasant, with nice houses and big gardens. There are usually parks for children to play in and large department stores where you can buy all you need. But what is the future of the big cities? Will they continue to get bigger? Perhaps not. Some major cities have actually become smaller in the last ten years, and it is quite possible that one day we will see people moving out of the major cities and back into smaller towns and villages. We can easily know that the underlined phrase "urban areas" in the first paragraph means_____________.A.areas of the countrysideB.areas of a town or cityC.areas near the countrysideD.areas near a town or city

In which areas do SMBs tend to require better products than found in retail stores?()A、voice, intranet, and securityB、wireless, intranet, and wide-area networkingC、wireless, security, and voiceD、security, voice, and wide-area networking

The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()A、intrusion protectionB、identityC、secure connectivityD、security management

Who is ultimately responsible for the security of a computer based information system within any organization?在任何机构内,哪一项是计算机信息系统安全的根本原因()A、an operational issue.操作问题B、a management issue.管理问题C、a training issue.培训问题D、a technical issue.技术问题

Which two companies are major competitors to IBM Maximo Asset Management solutions?()A、SAPB、OracleC、CandleD、InformixE、Computer Associates

You have a combined Windows 2000 and Windows 98 network that contain sensitive data. You want to utilize as many new Windows 2000 security features as possible. You want to customize a security policy on each computer to ensure that data is kept confidential and secured. Allcomputers must still be able to communicate with each other over the network. What should you do?()A、Use the security configuration and analysis console to improve the HISECWS security  template file.B、Use the local computer policy to disable the access this computer from the network option.C、Use SECEDIT to reconfigure the computer default security settings to not allow anonymous  access to the computer.D、Create a policy that excludes write access to the windows 2000 computers then apply the  policy to all non-windows 2000 computers.E、None of the above, Windows 9X systems cannot be secured using security template files.

Your network contains a computer named Computer1 that runs Windows 7.You need to verify if Computer1 has active DirectAccess connections to the network.What should you do?()A、From Network Connections, right-click the active network connection, and then click Status.B、From Network Connections, select the active network connection, and then click Diagnose this connection.C、From Windows Firewall with Advanced Security, click Monitoring, and then click Connection Security Rules.D、From Windows Firewall with Advanced Security, click Monitoring, click Security Associations, and then click Main Mode.

You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()A、Use secedit.exe to refresh the security policy.B、Use the local computer policy to configure the local security policy.C、Use security configuration and analysis to support the security files as a .pol file.D、Use computer management to configure the security policy setting.

You upgrade five computers in the Finance organizational unit (OU) from Windows NT Workstation 4.0 to Windows 2000 Professional. The computers are used by members of the Finance OU to run financial Applications. All five computers are configured to have the default security settings. A user named Helene reports that she can no longer log run the financial applications on her Windows 2000 Professional computer. Prior to the upgrade, Helene was able to run the financial applications on her computer. Helene is a member of the local Users group. You want the financial applications to run on her computer. What should you do?()A、 Use Computer Management to configure separate memory space for each financial application on Helene’s computer.B、 Use Security Templates to edit the Security Policy to include the financial application onHelene’s computer. Then add Helene’s user account to the Power Users group on Helene’s computer.C、 Use Security Configuration and Analysis to reconfigure the default security policy .inf to allow financial  applications to run on Helene’s computer.D、 Use Secedit.exe to apply the Compatws.inf security template on Helene’s Security Policy toloosen the permissions for the local Users group on Helene’s computer.

单选题Pitting in the suction areas of a centrifugal pump bronze impeller is usually caused by ().AcavitationBelectrolysisCabrasionDcorrosion

单选题You have two computers named Computer1 and Computer2 that run Windows 7. You need to ensure thatComputer2 has exactly the same firewall rules as Computer1.  What should you do on Computer1?()ARun Winrm.exe quickconfig.BFrom Windows Firewall with Advanced Security, select Export Policy.CFrom Windows Firewall with Advanced Security, click Inbound Rules and then click Export List.DOpen Local Security Policy. Right-click IP Security Policies on Local Computer and then click Export List.

单选题You need to design a method to automate the deployment of critical updates and security patches that are supplied by Microsoft as these updates and security patches are released. Your solution must meet technical requirements. What should you do?()ADeploy a Windows Server 2003 computer running SUS in the test network. Deploy SUS servers in each child domain to download administrator-approved updates from the test network SUS serverBDeploy a Windows Server 2003 computer running SUS in the test network Use autoupdate policies in each child domain to download and deploy updates from the test network SUS serverCInstall MBSA on a Windows Server 2003 computer in the network network. Deploy MBSA as a Windows Installer package to all computers in the child domains, and configure MBSA to scan for updates from the server in the test networkDInstall IIS on a Windows Server 2003 computer in the test network. Create a Web site named Updates on this server. Configure an autoupdate policy in each child domain to download and deploy updates from the Updates Web site

单选题Which of the following is example of telecommuting as described in the passage ?AA scientist in a laboratory developing plans for a space station.BA technical writer sending via computer documents created at home.CA computer technician repairing an office computer network.DA teacher directing computer-assisted learning in a private school.