单选题Who should measure the effectiveness of Information System security related controls in an organization?在一个组织内,谁应该衡量信息系统安全相关控制的有效性?()AThe local security specialist本地安全专家BThe systems auditor系统审计师CThe central security manager中心安全经理DThe business manager业务经理

单选题
Who should measure the effectiveness of Information System security related controls in an organization?在一个组织内,谁应该衡量信息系统安全相关控制的有效性?()
A

The local security specialist本地安全专家

B

The systems auditor系统审计师

C

The central security manager中心安全经理

D

The business manager业务经理


参考解析

解析: 暂无解析

相关考题:

There are a kind of persons who use computer to deal with data and produce some information,but they do not change the hardware system and the software system.Which kind of person are theyA.system architectB.language creatorC.terminal userD.computer scientist

The pressure differential across a diesel engine lube oil system duplex filter should be checked to ________.A.determine the need for filter cleaningB.measure any change in oil viscosityC.prevent damage to the filterD.determine the need for batch filtration

It is a kind of online service system, on which you can publish and exchange information with others who also are the members of the system.On which you can paste your articles and answer the questions asked by the members of the system and you can also look for help here.It isA.BBSB.WWWC.E-mailD.TELNET

The Border Gateway Protocol(BGP)is an interautonomous system【S1】protoco1.The primary function of a BGP speaking system is to exchange network【S2】information withother BGP system.This network reachability information includes information on the list of Auton0.mous System(ASs)that reachability information traverses.BGP一4 provides a new set of mecha-nisms for supposing【S3】interdomain routing.These mechanisms include support for adver-tising an IP【S4】and eliminate the concept of network class within BGP.BGP-4 also intro-duces mechanisms that allow aggregation of routes,including【S5】of AS paths.These chan-ges provide support for the proposed supernettting schem【S1】A.connectingB.resolvingC.routingD.supernettting

哪些系统消息具有bis和ter结构() A.System Information Type2B.System Information Type3C.System Information Type4D.System Information Type5

下面系统消息中,在通话状态发送的有()。 A.SYSTEM INFORMATION TYPE1B.SYSTEM INFORMATION TYPE2C.SYSTEM INFORMATION TYPE3D.SYSTEM INFORMATION TYPE4E.SYSTEM INFORMATION TYPE5F.SYSTEM INFORMATION TYPE6

Passage 1A concept car developed by Japanese company Nissan has a breathalyzer-like detection system and other instruments that could help keep drunk or over tired drivers off the road.The car's sensors check odors inside the car and monitor a driver's sweat for traces of alcohol. An in-car computer system can issue an alert or even lock up the ignition system if the driver seems over-the-limit. The air odor sensors are fixed' firmly and deeply in the driver and passenger seats, while a detector in the gear-shift knob measures perspiration from the driver's palm.Other carmakers have developed similar detection systems. For example, Sweden's Volvo has developed a breathalyzer attached to a car's seat belt that drivers must blow into before the engine will start.Nissan's new concept vehicle also includes a dashboard-mounted camera that tracks a driver's alertness by monitoring their eyes. It will sound an alarm and issue a spoken warning in Japanese or English if it judges that the driver needs to pull over and rest.The car technology is still in development, but general manager Kazuhiro Doi says the combination of different detection systems should improve the overall effectiveness of the technology."For example, if the gear-shift sensor was bypassed by a passenger using it instead of the driver, the facial recognition system would still be used," Doi says. Nissan has no specific timetable for marketing the system, but aims to use technology to cut the number of fatalities involving its vehicles to half 1995 levels by 2015.The car's seat belt can also tighten if drowsiness is detected, while an external camera checks that the car is keeping to its lane properly. However, Doi admits that some of the technology, such as the alcohol odor sensor, should be improved. "If you drink one beer, it's going to register, so we need to study what's the appropriate level for the system to activate," he says.According to Doi,__________.查看材料A.the overall effectiveness of the detection technology has improvedB.Nissan is making a timetable to market the detection systemC.it is impossible to improve the'overall effectiveness of the detection systemD.Nissan aims to improve the detection technology to reduce the fatality rate

Passage 1A concept car developed by Japanese company Nissan has a breathalyzer-like detection system and other instruments that could help keep drunk or over tired drivers off the road.The car's sensors check odors inside the car and monitor a driver's sweat for traces of alcohol. An in-car computer system can issue an alert or even lock up the ignition system if the driver seems over-the-limit. The air odor sensors are fixed' firmly and deeply in the driver and passenger seats, while a detector in the gear-shift knob measures perspiration from the driver's palm.Other carmakers have developed similar detection systems. For example, Sweden's Volvo has developed a breathalyzer attached to a car's seat belt that drivers must blow into before the engine will start.Nissan's new concept vehicle also includes a dashboard-mounted camera that tracks a driver's alertness by monitoring their eyes. It will sound an alarm and issue a spoken warning in Japanese or English if it judges that the driver needs to pull over and rest.The car technology is still in development, but general manager Kazuhiro Doi says the combination of different detection systems should improve the overall effectiveness of the technology."For example, if the gear-shift sensor was bypassed by a passenger using it instead of the driver, the facial recognition system would still be used," Doi says. Nissan has no specific timetable for marketing the system, but aims to use technology to cut the number of fatalities involving its vehicles to half 1995 levels by 2015.The car's seat belt can also tighten if drowsiness is detected, while an external camera checks that the car is keeping to its lane properly. However, Doi admits that some of the technology, such as the alcohol odor sensor, should be improved. "If you drink one beer, it's going to register, so we need to study what's the appropriate level for the system to activate," he says.In the UK, some research groups are using similar advanced techniques to understand driver behavior and the effectiveness of different road designs. According to Doi,__________.A. the overall effectiveness of the detection technology has improvedB. Nissan is making a timetable to market the detection systemC. it is impossible to improve the'overall effectiveness of the detection systemD. Nissan aims to improve the detection technology to reduce the fatality rate

A requirement is simply a statement of what the system must do or what characteristics it needs to have. Requirements written from the perspective of user and focus on user needs are called __(71)__. Requirements written from the developer's perspective and describe how the system will be implemented are called __(72)__. Requirements evolve from detailed statemens of business capabilities that a system should have to detailed statements of the technical way in whick the capabilities will be implemented in the new system. Requirements can be either functional or nofunctional in nature. For example, during the analysis phase of travel vehicles sales system, the system that must have the ability to search for available inventory is __(73)__. The requirement that the system should be able to work on any Web browser belongs to __(74)__. That customer personal information is protected in compliance with the Data Protection Act is a requirement of __(75)__.(72)应选?A.operational requirementsB.business requirementsC.technical requirementsD.system requirements

A requirement is simply a statement of what the system must do or what characteristics it needs to have. Requirements evolve from broad statements of overall (71)from the system to detailed statements of the business capabilities that a system should support to detailed technical statements of the way in which the capabilities will be implemented in the new system. (72)focus on describing how to create the software product that will be produced from the project Nonfunctional requirements are primarily used in the design phase when decisions are made about the user interface, the hardware and software, and the system's underlying architecture. The system's physical and technical environments would be considered (73). The speed, capacity, and reliability of the system belong to (74).(75)describes that who has authorized access to the system under what circumstances.(74)应选?A.security requirementB.performance requirementC.technical requirementD.information requirement

A requirement is simply a statement of what the system must do or what characteristics it needs to have. Requirements evolve from broad statements of overall (71)from the system to detailed statements of the business capabilities that a system should support to detailed technical statements of the way in which the capabilities will be implemented in the new system. ( )focus on describing how to create the software product that will be produced from the project Nonfunctional requirements are primarily used in the design phase when decisions are made about the user interface, the hardware and software, and the system's underlying architecture. The system's physical and technical environments would be considered ( ). The speed, capacity, and reliability of the system belong to ( ).( )describes that who has authorized access to the system under what circumstances.(71)应选?A.business needsB.operation processesC.technical specificationD.function components

A requirement is simply a statement of what the system must do or what characteristics it needs to have. Requirements written from the perspective of user and focus on user needs are called __(71)__. Requirements written from the developer's perspective and describe how the system will be implemented are called __(72)__. Requirements evolve from detailed statemens of business capabilities that a system should have to detailed statements of the technical way in whick the capabilities will be implemented in the new system. Requirements can be either functional or nofunctional in nature. For example, during the analysis phase of travel vehicles sales system, the system that must have the ability to search for available inventory is __(73)__. The requirement that the system should be able to work on any Web browser belongs to __(74)__. That customer personal information is protected in compliance with the Data Protection Act is a requirement of __(75)__.(75)应选?A..information requirementsB.system performanceC.secrity anD.controlD.cultural anD.political

A requirement is simply a statement of what the system must do or what characteristics it needs to have. Requirements written from the perspective of user and focus on user needs are called __(71)__. Requirements written from the developer's perspective and describe how the system will be implemented are called __(72)__. Requirements evolve from detailed statemens of business capabilities that a system should have to detailed statements of the technical way in whick the capabilities will be implemented in the new system. Requirements can be either functional or nofunctional in nature. For example, during the analysis phase of travel vehicles sales system, the system that must have the ability to search for available inventory is __(73)__. The requirement that the system should be able to work on any Web browser belongs to __(74)__. That customer personal information is protected in compliance with the Data Protection Act is a requirement of __(75)__.(74)应选?A.functional requirementsB.technical requirementsC.operational requirementsD.information requirements

Who should measure the effectiveness of Information System security related controls in an organization?在一个组织内,谁应该衡量信息系统安全相关控制的有效性?()A、The local security specialist本地安全专家B、The systems auditor系统审计师C、The central security manager中心安全经理D、The business manager业务经理

Which of the following statements are FALSE concerning the defragfs command?()A、 The defragfs command should not be run against file systems and logical volumes that contain mostly transitory information, such as /tmp.B、 The defragfs command should not be run on a large JFS2 file system when running on a 32-bit kernel.C、 The defragfs command can improve file system performance by increasing the file system’s contiguous free space.D、 The defragfs command can only be run against file systems that are mounted with read-write permissions.

下面系统消息中,在通话状态发送的有()。A、SYSTEM INFORMATION TYPE1B、SYSTEM INFORMATION TYPE2C、SYSTEM INFORMATION TYPE3D、SYSTEM INFORMATION TYPE4E、SYSTEM INFORMATION TYPE5F、SYSTEM INFORMATION TYPE6

下列哪个消息是在移动台空闲模式下收到()A、SYSTEM INFORMATION5B、SYSTEM INFORMATION5TERC、SYSTEM INFORMATION6D、SYSTEM INFORMATION2TER

A user states that all their incoming mail is showing that it is behind three hours. All other users have the correct time. Which of the following should the technician check?()A、The system’s local time settingsB、The system’s O/S version and patch statusC、The system’s network configurationD、The mail server’s configuration

After the LED display is flashing 888 and the system is rebooted, which of the following commands should be used to gather dump information?()A、snap B、errpt C、kdb D、trace

A Sales Specialist receives an email from a customer, requesting information on IBM’s best Server Consolidation solution. How should the Sales Specialist proceed? ()A、Send the customer information on VMwareB、Send the customer information on IBM BladeCenter C、Call the customer to ask why they are consolidatingD、Send the customer information on IBM System P

A system administrator was asked to log information on possible security breaches on a server. Which file should additional entries be added to capture this information?()A、/var/adm/sulogB、/etc/syslog.confC、/etc/security/sysck.cfgD、/etc/security/login.cfg

单选题The distress message of a ship should include considerable information which might facilitate the rescue. This information should().AALWAYS be included in the initial distress messageBbe sent to a Coast Guard station FIRSTCbe transmitted as a series of short messages,if time allowsDinclude the vessel's draft

单选题Stephen Smith feels thatAthe security of information on the network used to be a worry.Ball the data should be stored on the same system.Cthe company’s computer-based information is well-protected.

单选题A suggested measure to be taken to reduce teenagers’ driving accidents is that _____.Adriving in the presence of an adult should be made a ruleBthey should be prohibited from taking on passengersCthey should not be allowed to drive after 10 p. m.Dthe licensing system should be improved

单选题Which of the following statements are FALSE concerning the defragfs command?()A The defragfs command should not be run against file systems and logical volumes that contain mostly transitory information, such as /tmp.B The defragfs command should not be run on a large JFS2 file system when running on a 32-bit kernel.C The defragfs command can improve file system performance by increasing the file system’s contiguous free space.D The defragfs command can only be run against file systems that are mounted with read-write permissions.

单选题The distress message of a ship should include considerable information which might facilitate the rescue. This information should().AALWAYS be included in the initial distress messageBbe sent to a MSA station FIRSTCbe transmitted as a series of short messages,if time allowsDinclude the vessel's draft

单选题The company should establish procedures by which()receive relevant information on the safety management system in working language or language understood by them.ANew personnelBThe ship's personnelCPersonnel transferred to new assignmentsDVisitor