Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examplesof which of the following security types?()A、PhysicalB、LogicalC、SoftwareD、Authentication

Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examplesof which of the following security types?()

  • A、Physical
  • B、Logical
  • C、Software
  • D、Authentication

相关考题:

Computer systems consist of two very different types of elements: Hardware, which includes all the physical things that can be touched and(71)which tells the hardware how to do.A.Operating systemB.I/O devicesC.CoursewareD.Software

Which of the following is a way to protect server operating systems from a short term contractor?() A. Biometric devicesB. Limited logon hoursC. MantrapsD. Rack doors

Which of the following are types of biometric devices used in server rooms?() A. MantrapsB. Fingerprint scannersC. CCTV systemsD. Retina scannerE. Proxy card readers

Which of the following provides the BEST security and accountability for a Data Center?() A. Entry loggingB. Combination locksC. Card keysD. Dead bolts

Examples of types of physical access controls include all EXCEPT which of the following? 以下哪一个选项不属于典型的物理访问控制手段?()A、passwords密码B、guards守卫C、locks锁D、badges徽章

Which of the following processes are likely to be found in a microkernel?()A、Lightweight messagingB、Memory managementC、Hardware abstractionD、Host stackE、Process schedulingF、All of the above

Which of the following is a way to protect server operating systems from a short term contractor?()A、Biometric devicesB、Limited logon hoursC、MantrapsD、Rack doors

Which one of the following describes who will be able to see an existing doc that contains a readers field ?()A、only those people listed in the access listB、anyone listed as a reader or above in the aclC、only those people list in the readers fieldD、anyone list as a reader or above in the acl and who is also list in the readers field

Which of the following provides the BEST security and accountability for a Data Center?()A、Entry loggingB、Combination locksC、Card keysD、Dead bolts

Which of the following would be an example of a biometric device?()A、USB security keyB、smart card readerC、thumb print readerD、encryption password

Which of the following is the MOST important reason for referencing the HCL?()A、 To ensure that all hardware being used has previously been testedB、 To ensure that all hardware being used has the latest firmwareC、 To ensure that all hardware being used is the most energy efficientD、 To ensure that all hardware being used can be upgraded in the future

Which of the following is a multimedia device?()A、Biometric deviceB、MouseC、CamcorderD、Infrared scanner

Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()A、Intrusion detectionB、VirtualizationC、KitingD、Cloning

Which of the following are types of biometric devices used in server rooms? ()A、 MantrapsB、 Fingerprint scannersC、 CCTV systemsD、 Retina scannerE、 Proxy card readers

Which of the following commands identifies all network adapter types that are installed in a machine?()A、lsdevB、lsattrC、ifconfigD、netstat

You are designing an authentication strategy for the accounting department. Your solution must meet business requirements. What should you do?()A、Install wireless network cards on all accounting department computers. Select PEAP authenticationB、Install user certificates on all accounting department computers. Configure these computers to respond to requests for IPSec encryptionC、Issue smart cards and smart card readers to all accounting department users and computers. Require NTLMv2 authenticationD、Issue smart cards and smart card readers to all accounting department users and computers. Configure the domain to require smart cards for the accounting department users during logon

You need to design an authentication strategy for users of portable computers. Your solution must meet business requirements. What should you do?()A、Issue smart cards and smart card readers to all portable computer users. Configure the domain to require smart cards for login and to log off users who remote their smart cardsB、Configure the portable computers to connect to only wireless networks that use Wired Equivalent Privacy (WEP). Install digital certificates on all portable computersC、Install computer certificates on all portable computers. Configure all portable computers to respond to requests for IPSec encryptionD、Install biometric authentication devices on all portable computers. Configure the Default Domain Policy GPO to require complex passwords for all users

Which of the following ensures the MOST secure access to a server room?()A、 ID card readersB、 Server rack doorsC、 Biometric devicesD、 Locked doors

单选题Which of the following provides the BEST security and accountability for a Data Center?()A Entry loggingB Combination locksC Card keysD Dead bolts

单选题Which of the following is a way to protect server operating systems from a short term contractor?()A Biometric devicesB Limited logon hoursC MantrapsD Rack doors

单选题Which of the following ensures the MOST secure access to a server room?()A ID card readersB Server rack doorsC Biometric devicesD Locked doors

单选题A gives meaning to readers' lifeB makes readers blessed with wisdomC puts readers in a peaceful state of mindD enables readers to have a sense of belonging

单选题Computer systems consist of two very different types of elements:Hardware,which includes all the physical things that can be touched and(),which tells thehardware how to do.ASoftwareBCoursewareCOperatingsystemDI/Odevices

单选题Which of the following is the MOST important reason for referencing the HCL?()A To ensure that all hardware being used has previously been testedB To ensure that all hardware being used has the latest firmwareC To ensure that all hardware being used is the most energy efficientD To ensure that all hardware being used can be upgraded in the future

单选题That’s all I’m ______ . A Denny from each of your readers.”AaskingBwritingCsayingDdoing

多选题Which of the following are types of biometric devices used in server rooms? ()AMantrapsBFingerprint scannersCCCTV systemsDRetina scannerEProxy card readers

单选题Hardware locks, keypads on entry doors, badge readers, and biometric readers are all examplesof which of the following security types?()APhysicalBLogicalCSoftwareDAuthentication