单选题A bank wants to maximize the security of employee computer data displayed on their screen.Which of the following would BEST accomplish these goals?()AKeyboard filtersBPrivacy filtersCScreensaversDSecure display drivers
单选题
A bank wants to maximize the security of employee computer data displayed on their screen.Which of the following would BEST accomplish these goals?()
A
Keyboard filters
B
Privacy filters
C
Screensavers
D
Secure display drivers
参考解析
解析:
暂无解析
相关考题:
Virus Security Software is designed to detect, eliminate or quarantine computer viruses before they are able to harm a computer or server networked system.A.AntiB.InvadeC.InroadD.Aggression
The central idea of this passage is ______.A.electronic transfer of fundsB.bank's payment mechanismC.clearing of checksD.computer and payment
A user wants to convert their current computer into an audio/video editing workstation byupgrading components. They want to start by upgrading the hard drive. Which of the followinghard drives should be chosen to maximize read/write speed?()A. Zip driveB. 15,000 rpm SATAC. 7,200 rpm IDED. USB flash
A bank wants to maximize the security of employee computer data displayed on their screen.Which of the following would BEST accomplish these goals?() A. Keyboard filtersB. Privacy filtersC. ScreensaversD. Secure display drivers
Your company has a main office and a branch office. The network contains an Active Directory forest. All users on the network access the Internet from their computers. The company hires a temporary employee who has his own portable computer. The employee connects his portable computer to the network. When the employee attempts to join the computer to the domain, the connection fails. A help desk technician reports the following about the employee. He has a domain user account.His computer can access Internet Web sites.His computer can contact domain controllers by using the domain controllers IP addresses. You need to ensure that the employees computer can join the domain. The solution must ensure that the computer can access resources on the Internet. What should you do?()A.Modify the time zone for the computer.B.Modify the IPv4 settings on the computer.C.Create an A record for the computer in an internal DNS zone.D.Request that an administrator create a prestaged computer account in the domain.
Human resource management is the management of human resources.It is function in organizations designed to maximize employee ( ) in service of an employer's strategic objectives.A.workB.jobC.scopeD.performance
UCLA had taken away all Social Security numbers from common usage to ensure the computer security.
Human resource management is the management of human resources. It is a function in organization designed to maximize employee ( )in service of an employer’s strategic objectives.A.workB. joB. C.scopeD.performance
A user wants to convert their current computer into an audio/video editing workstation byupgrading components. They want to start by upgrading the hard drive. Which of the followinghard drives should be chosen to maximize read/write speed?()A、Zip driveB、15,000 rpm SATAC、7,200 rpm IDED、USB flash
You have two computers named Computer1 and Computer2 that run Windows 7. You need to ensure thatComputer2 has exactly the same firewall rules as Computer1. What should you do on Computer1?()A、Run Winrm.exe quickconfig.B、From Windows Firewall with Advanced Security, select Export Policy.C、From Windows Firewall with Advanced Security, click Inbound Rules and then click Export List.D、Open Local Security Policy. Right-click IP Security Policies on Local Computer and then click Export List.
A technician wants to prevent employees from installing software on company computers. In which of the following groups should the employee accounts be placed?()rsA、Power UsersB、UsersC、GuestsD、Administrato
For the following attempts, which one is to ensure that no one employee becomes a pervasive securitythreat, that data can be recovered from backups, and that information system changes do not compromisea system’s security?()A、Strategic security planningB、Disaster recoveryC、Implementation securityD、Operations security
A System p administrator is investigating a possible security breech and wants to review information about failed login attempts to the system. Which of the following commands will show this()A、fwtmp /etc/security/failedloginB、cat /etc/security/failedloginC、whoD、alog -f /etc/security/failedlogin -o
Your company has a main office and a branch office. The network contains an Active Directory forest. All users on the network access the Internet from their computers. The company hires a temporary employee who has his own portable computer. The employee connects his portable computer to the network. When the employee attempts to join the computer to the domain, the connection fails. A help desk technician reports the following about the employee. He has a domain user account.His computer can access Internet Web sites.His computer can contact domain controllers by using the domain controllers IP addresses. You need to ensure that the employees computer can join the domain. The solution must ensure that the computer can access resources on the Internet. What should you do?()A、Modify the time zone for the computer.B、Modify the IPv4 settings on the computer.C、Create an A record for the computer in an internal DNS zone.D、Request that an administrator create a prestaged computer account in the domain.
You have a combined Windows 2000 and Windows 98 network that contain sensitive data. You want to utilize as many new Windows 2000 security features as possible. You want to customize a security policy on each computer to ensure that data is kept confidential and secured. Allcomputers must still be able to communicate with each other over the network. What should you do?()A、Use the security configuration and analysis console to improve the HISECWS security template file.B、Use the local computer policy to disable the access this computer from the network option.C、Use SECEDIT to reconfigure the computer default security settings to not allow anonymous access to the computer.D、Create a policy that excludes write access to the windows 2000 computers then apply the policy to all non-windows 2000 computers.E、None of the above, Windows 9X systems cannot be secured using security template files.
You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()A、Use secedit.exe to refresh the security policy.B、Use the local computer policy to configure the local security policy.C、Use security configuration and analysis to support the security files as a .pol file.D、Use computer management to configure the security policy setting.
You upgrade five computers in the Finance organizational unit (OU) from Windows NT Workstation 4.0 to Windows 2000 Professional. The computers are used by members of the Finance OU to run financial Applications. All five computers are configured to have the default security settings. A user named Helene reports that she can no longer log run the financial applications on her Windows 2000 Professional computer. Prior to the upgrade, Helene was able to run the financial applications on her computer. Helene is a member of the local Users group. You want the financial applications to run on her computer. What should you do?()A、 Use Computer Management to configure separate memory space for each financial application on Helene’s computer.B、 Use Security Templates to edit the Security Policy to include the financial application onHelene’s computer. Then add Helene’s user account to the Power Users group on Helene’s computer.C、 Use Security Configuration and Analysis to reconfigure the default security policy .inf to allow financial applications to run on Helene’s computer.D、 Use Secedit.exe to apply the Compatws.inf security template on Helene’s Security Policy toloosen the permissions for the local Users group on Helene’s computer.
单选题Your company has a main office and a branch office. The network contains an Active Directory forest. All users on the network access the Internet from their computers. The company hires a temporary employee who has his own portable computer. The employee connects his portable computer to the network. When the employee attempts to join the computer to the domain, the connection fails. A help desk technician reports the following about the employee. He has a domain user account.His computer can access Internet Web sites.His computer can contact domain controllers by using the domain controllers IP addresses. You need to ensure that the employees computer can join the domain. The solution must ensure that the computer can access resources on the Internet. What should you do?()AModify the time zone for the computer.BModify the IPv4 settings on the computer.CCreate an A record for the computer in an internal DNS zone.DRequest that an administrator create a prestaged computer account in the domain.
单选题You upgrade five computers from Windows NT 4.0 Workstation to Windows 2000 Professional. These computers are used by the members of the Finance OU to run financial applications. All five computers are configured to have the default security settings. A User named Helena, reports that she can no longer run the financial Applications on her Windows 2000 Professional computer. Prior to the upgrade, Helena was able to run the applications on her computer. Helena is member of the Local User group. You want the applications to run on her computer. What should you do?()AUse Computer Management to configure separate memory spaces for each financial application on Helena’s Computer.BUse Security Templates to edit the Security Policy to include the financial applications on Helena’s Computer. Then add Helena’s user account to the Power User Group on Helena’s Computer.CUse Security Configuration and Analysis to reconfigure the default security policy .inf file to allow the finance applications to run on Helena’s Computer.DUse secedit.exe to apply the Compatws.inf security template to Helena’s Security Policy to loose the permission for the Local User group on Helena’s Computer.
单选题You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()AUse secedit.exe to refresh the security policy.BUse the local computer policy to configure the local security policy.CUse security configuration and analysis to support the security files as a .pol file.DUse computer management to configure the security policy setting.
单选题AA new computer system was installed.BInformation was entered into the computer system correctly.CSome employee information got lost.DPaychecks were distributed for the wrong amount.
单选题You have a combined Windows 2000 and Windows 98 network that contain sensitive data. You want to utilize as many new Windows 2000 security features as possible. You want to customize a security policy on each computer to ensure that data is kept confidential and secured. Allcomputers must still be able to communicate with each other over the network. What should you do?()AUse the security configuration and analysis console to improve the HISECWS security template file.BUse the local computer policy to disable the access this computer from the network option.CUse SECEDIT to reconfigure the computer default security settings to not allow anonymous access to the computer.DCreate a policy that excludes write access to the windows 2000 computers then apply the policy to all non-windows 2000 computers.ENone of the above, Windows 9X systems cannot be secured using security template files.
单选题You have two computers named Computer1 and Computer2 that run Windows 7. You need to ensure thatComputer2 has exactly the same firewall rules as Computer1. What should you do on Computer1?()ARun Winrm.exe quickconfig.BFrom Windows Firewall with Advanced Security, select Export Policy.CFrom Windows Firewall with Advanced Security, click Inbound Rules and then click Export List.DOpen Local Security Policy. Right-click IP Security Policies on Local Computer and then click Export List.
单选题A technician wants to prevent employees from installing software on company computers. In which of the following groups should the employee accounts be placed?()rsAPower UsersBUsersCGuestsDAdministrato
单选题A user wants to convert their current computer into an audio/video editing workstation byupgrading components. They want to start by upgrading the hard drive. Which of the followinghard drives should be chosen to maximize read/write speed?()AZip driveB15,000 rpm SATAC7,200 rpm IDEDUSB flash