● One of the basic rules of computer security is to change your(73) regularly.(73)A. nameB. computerC. passwordD. device

● One of the basic rules of computer security is to change your(73) regularly.

(73)

A. name

B. computer

C. password

D. device


相关考题:

● CMOS SETUP utility allows you to change your system (73) by selecting a variety of options.(73)A. devicesB. softwareC. configurationD. size

A Web (73) is one of many software applications that function as the interfacebetween a user and the Internet.(73)A. displayB. browserC. windowD. view

● Project manager believes that modifying the project scope may provide added value for the customer. The project manager should (73) .(73) A. change the scope baselineB. contact the customer to determine if the change adds valueC. call a meeting of the change control boardD. change the project' s objectives

● A project life cycle is a collection of generally sequential project (73)whose name and number are determined by the control needs of the organization or organizations involved in the project. The life cycle provides the basic (74)for managing the project, regardless of the specific work involved.(73)A. phasesB. processesC. segmentsD. pieces(74)A. planB. fractionC. mainD. framework

● A Web ___(73)___ is one of many software applications that function as the interfacebetween a user and the Internet.(73)A. display B. browser C. window D. view

A project life cycle is a collection of generally sequential project (73) whose name and number are determined by the control needs of the organization or organizations involved in the project. The life cycle provides the basic (74) for managing the project, regardless of the specific work involved.A.phasesB.processesC.segmentsD.pieces

● The program and the data are kept inside the computer in a place called(73) .(73)A. busB. cacheC. CPUD. memory

● (73) is the first line of protect between your computer and the public Internet.(73)A. The Internet protocolB. The firewallC. The anti-virus softwareD. The intrusion-detection systems

● One of the basic rules of computer security is to change your (73) regularly.(73)A. nameB. computerC. deviceD. password

● To document your code can increase program (72) and make program easier to (73).(72)A. reliabilityB. securityC. readabilityD. usability(73)A. executeB. interpretC. compileD. maintain

Your network contains a computer named Computer1 that runs Windows 7.You need to verify if Computer1 has active DirectAccess connections to the network.What should you do?() A. From Network Connections, right-click the active network connection, and then click Status.B. From Network Connections, select the active network connection, and then click Diagnose this connection.C. From Windows Firewall with Advanced Security, click Monitoring, and then click Connection Security Rules.D. From Windows Firewall with Advanced Security, click Monitoring, click Security Associations, and then click Main Mode.

Password is a(n)(71)series of characters that enables a user(72)a file, computer or program. On multi - user systems,(73)user must enter his or her password(74)the computer will respond to commands. The password helps ensure that unauthorized users do not access the computer. In addition, data files and programs may require a password.Ideally, the password should be something(75)could guess. In practice, most people choose a password that is easy to remember, such as their name or their initials. This is one reason it is relatively easy to break into most computer system.A.obviousB.secretC.importantD.easy

One solution to major security problems is(73),which are frequently installed to fix known security holes.A.patchesB.compensationsC.complementsD.additions

One of the basic rules of computer security is to change your ______ regularly.A.nameB.computerC.deviceD.PasswordA.B.C.D.

● __(73)__ are the four major activities of software configuration management.①configuration identification ②statement report ③change control④preparation of requirement document ⑤configuration auditing(73)A.①②③④ B.①②④⑤ C.①②③⑤ D.②③④⑤

One of the basic rules of computer security is to change your(73)regularly.A.nameB.computerC.deviceD.password

One of the basic roles of computer security is to change your((73))regularly.A.nameB.computerC.passwordD.device

Conventionally,a computer consists of at1.ast one processing element, typically a(73) and some form of memory.A.deviceB.CPUC.controllerD.network

●A (73) is a named memory block. By using its name, we can refer to the data stored in the memory block.(73)A.wordB.recordC.programD.variable

● (73) manages the other components of a computer system.(73)A.BusB.Application systemC.Operating systemD.Disk

● The most important program on any computer is (73) .(73)A. Office 2000B. VirusC. softwareD. Operating System

You are the administrator of 10 Windows XP Professional computers for your company. The computers are members of a Windows 2000 domain. Because the computers are used in a public area in the cafeteria, you audit all security events on the computers. A user named Marc reports that he was using one of the Windows XP Professional computers when the computer suddenly shut down with a STOP error. When the computer restarted, Marc attempted to log on by using the same user name and password that he used before. Marc received the following error message: "Your account is configured to prevent you from using this computer. Please try another computer." Marc states that he did not do anything to cause the STOP error to occur. You want to ensure that Marc can use this computer. What should you do?() A、On the computer, save and clear the security log, set the CrashOnAuditFail setting to 1, and restart the computer. B、On the computer, modify the local audit policy so that system events are not audited, set the CrashOnCtrlScroll setting to 1, and restart the computer. C、In the domain, modify Marc's Logon Workstations list to include the name of the computer.D、In the domain, modify Marc's account properties to unlock the account.

Your network contains a computer named Computer1 that runs Windows 7.You need to verify if Computer1 has active DirectAccess connections to the network.What should you do?()A、From Network Connections, right-click the active network connection, and then click Status.B、From Network Connections, select the active network connection, and then click Diagnose this connection.C、From Windows Firewall with Advanced Security, click Monitoring, and then click Connection Security Rules.D、From Windows Firewall with Advanced Security, click Monitoring, click Security Associations, and then click Main Mode.

You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()A、Use secedit.exe to refresh the security policy.B、Use the local computer policy to configure the local security policy.C、Use security configuration and analysis to support the security files as a .pol file.D、Use computer management to configure the security policy setting.

问答题Practice 3  Your TV set broke down only one week after it was brought. Write a letter of complaint to the store where your TV set was bought.  1) to express what is wrong with your TV set  2) to make your request (change for a new one, or return the broken one... )  3) to urge the store to give an early reply  You should write approximately 100 words. Do not sign your own name at the end of your letter. Use “Wang Lin” instead. You do not need to write your address and the date.

单选题You are the network administrator for ExamSheet.net.  You have implemented the Hisecws.inf security template on all the Windows 2000 Professional computers in your network by using a GPO. A user has received a driver and utility software for the internal SCSI controller on his computer. The SCSI controller is not currently on the HCL. He uses the manufacturer provided CD to install the driver and the utility. He restarts the computer and reports that the internal SCSI controller is not working correctly.  You want to allow all users to install this driver on their client computers. You want to accomplish this task with the least amount of administrative effort. What should you do?()AModify the GPO to change the Driver Signing option. BRun theSigverifcommand on each client computer.CReconfigure the Driver Signing option on each client computer. Install the driver on each client     computer. Reapply the security template settings on each client computer.DModify the Hisecws.inf security template on each client computer to change the Driver Signing     option.EModify the Hisecws.inf security template on the domain controller to change the Driver Signing     option.

单选题You have two computers named Computer1 and Computer2 that run Windows 7. You need to ensure thatComputer2 has exactly the same firewall rules as Computer1.  What should you do on Computer1?()ARun Winrm.exe quickconfig.BFrom Windows Firewall with Advanced Security, select Export Policy.CFrom Windows Firewall with Advanced Security, click Inbound Rules and then click Export List.DOpen Local Security Policy. Right-click IP Security Policies on Local Computer and then click Export List.

单选题You are attempting to connect to your ISP. You view the status change from Dialing to Verifying user name and password. After several seconds, the status changes to Disconnecting. You are then disconnected from the computer you dialed. You verify that your user name and password are entered correctly. You want to enable your Computer to connect to your ISP correctly. What should you do? ()AConfigure your connection to enable data encryption.BConfigure your connection to use the UNIX SLIP server.CConfigure your connection to allow unsecured passwords.DInstruct your ISP to configure your account to support Multilink.