单选题Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examplesof which of the following security types?()APhysicalBLogicalCSoftwareDAuthentication
单选题
Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examplesof which of the following security types?()
A
Physical
B
Logical
C
Software
D
Authentication
参考解析
解析:
暂无解析
相关考题:
Which of the following is a way to protect server operating systems from a short term contractor?() A. Biometric devicesB. Limited logon hoursC. MantrapsD. Rack doors
Which of the following are types of biometric devices used in server rooms?() A. MantrapsB. Fingerprint scannersC. CCTV systemsD. Retina scannerE. Proxy card readers
Examples of types of physical access controls include all EXCEPT which of the following? 以下哪一个选项不属于典型的物理访问控制手段?()A、passwords密码B、guards守卫C、locks锁D、badges徽章
Which of the following is a way to protect server operating systems from a short term contractor?()A、Biometric devicesB、Limited logon hoursC、MantrapsD、Rack doors
Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examplesof which of the following security types?()A、PhysicalB、LogicalC、SoftwareD、Authentication
Which one of the following describes who will be able to see an existing doc that contains a readers field ?()A、only those people listed in the access listB、anyone listed as a reader or above in the aclC、only those people list in the readers fieldD、anyone list as a reader or above in the acl and who is also list in the readers field
Which of the following provides the BEST security and accountability for a Data Center?()A、Entry loggingB、Combination locksC、Card keysD、Dead bolts
Which of the following would be an example of a biometric device?()A、USB security keyB、smart card readerC、thumb print readerD、encryption password
Which of the following is the MOST important reason for referencing the HCL?()A、 To ensure that all hardware being used has previously been testedB、 To ensure that all hardware being used has the latest firmwareC、 To ensure that all hardware being used is the most energy efficientD、 To ensure that all hardware being used can be upgraded in the future
Which of the following are types of biometric devices used in server rooms? ()A、 MantrapsB、 Fingerprint scannersC、 CCTV systemsD、 Retina scannerE、 Proxy card readers
You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?()A、Install wireless network cards on all accounting department computers. Select PEAP authenticationB、Install user certificates on all accounting department computers. Configure these computers to respond to requests for IPSec encryptionC、Issue smart cards and smart card readers to all accounting department users and computers. Require NTLMv2 authenticationD、Issue smart cards and smart card readers to all accounting department users and computers. Configure the domain to require smart cards for the accounting department users during logon
You need to design an authentication strategy for users of portable computers. Your solution must meet business requirements. What should you do?()A、Issue smart cards and smart card readers to all portable computer users. Configure the domain to require smart cards for login and to log off users who remote their smart cardsB、Configure the portable computers to connect to only wireless networks that use Wired Equivalent Privacy (WEP). Install digital certificates on all portable computersC、Install computer certificates on all portable computers. Configure all portable computers to respond to requests for IPSec encryptionD、Install biometric authentication devices on all portable computers. Configure the Default Domain Policy GPO to require complex passwords for all users
Which of the following ensures the MOST secure access to a server room?()A、 ID card readersB、 Server rack doorsC、 Biometric devicesD、 Locked doors
单选题Which of the following would be an example of a biometric device?()AUSB security keyBsmart card readerCthumb print readerDencryption password
单选题Which one of the following describes who will be able to see an existing doc that contains a readers field ?()Aonly those people listed in the access listBanyone listed as a reader or above in the aclConly those people list in the readers fieldDanyone list as a reader or above in the acl and who is also list in the readers field
单选题Which of the following commands identifies all network adapter types that are installed in a machine?()AlsdevBlsattrCifconfigDnetstat
单选题Which of the following provides the BEST security and accountability for a Data Center?()A Entry loggingB Combination locksC Card keysD Dead bolts
单选题Which of the following is a way to protect server operating systems from a short term contractor?()A Biometric devicesB Limited logon hoursC MantrapsD Rack doors
单选题Which of the following ensures the MOST secure access to a server room?()A ID card readersB Server rack doorsC Biometric devicesD Locked doors
单选题A gives meaning to readers' lifeB makes readers blessed with wisdomC puts readers in a peaceful state of mindD enables readers to have a sense of belonging
单选题You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?()AInstall wireless network cards on all accounting department computers. Select PEAP authenticationBInstall user certificates on all accounting department computers. Configure these computers to respond to requests for IPSec encryptionCIssue smart cards and smart card readers to all accounting department users and computers. Require NTLMv2 authenticationDIssue smart cards and smart card readers to all accounting department users and computers. Configure the domain to require smart cards for the accounting department users during logon
单选题You need to design an authentication strategy for users of portable computers. Your solution must meet business requirements. What should you do?()AIssue smart cards and smart card readers to all portable computer users. Configure the domain to require smart cards for login and to log off users who remote their smart cardsBConfigure the portable computers to connect to only wireless networks that use Wired Equivalent Privacy (WEP). Install digital certificates on all portable computersCInstall computer certificates on all portable computers. Configure all portable computers to respond to requests for IPSec encryptionDInstall biometric authentication devices on all portable computers. Configure the Default Domain Policy GPO to require complex passwords for all users
单选题Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()AIntrusion detectionBVirtualizationCKitingDCloning
单选题Computer systems consist of two very different types of elements:Hardware,which includes all the physical things that can be touched and(),which tells thehardware how to do.ASoftwareBCoursewareCOperatingsystemDI/Odevices
单选题Which of the following is the MOST important reason for referencing the HCL?()A To ensure that all hardware being used has previously been testedB To ensure that all hardware being used has the latest firmwareC To ensure that all hardware being used is the most energy efficientD To ensure that all hardware being used can be upgraded in the future
多选题Which of the following are types of biometric devices used in server rooms? ()AMantrapsBFingerprint scannersCCCTV systemsDRetina scannerEProxy card readers