单选题A bank wants to maximize the security of employee computer data displayed on their screen.Which of the following would BEST accomplish these goals?()AKeyboard filtersBPrivacy filtersCScreensaversDSecure display drivers
单选题
A bank wants to maximize the security of employee computer data displayed on their screen.Which of the following would BEST accomplish these goals?()
A
Keyboard filters
B
Privacy filters
C
Screensavers
D
Secure display drivers
参考解析
解析:
暂无解析
相关考题:
A bank wants to maximize the security of employee computer data displayed on their screen.Which of the following would BEST accomplish these goals?() A. Keyboard filtersB. Privacy filtersC. ScreensaversD. Secure display drivers
Which of the following commands would be used to display the IP address on a UNIX/Linux computer?() A.netstatB.ipconfigC.ifconfigD.dig
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption
For security reasons a network technician wants to install a Linux based email server, Microsoftweb services, and directory services on different servers.Which of the following technologies would be BEST to reduce hard ware costs?()A. VPN concentratorB. Virtual serversC. WirelessD. Multimode fiber
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A、WEP encryptionB、Channel rotationC、Disable SSIDD、WPA encryption
A user wants to be permanently added to the dba group. Which of the following commands or processes can be used to accomplish this()A、chgrpB、chuserC、edit /etc/userD、edit /etc/security/group
A bank wants to maximize the security of employee computer data displayed on their screen.Which of the following would BEST accomplish these goals?()A、Keyboard filtersB、Privacy filtersC、ScreensaversD、Secure display drivers
Which of the following devices would allow a technician to utilize a single mouse, keyboard, and display to control numerous desktop PCs?()A、Port replicatorB、Docking stationC、USB hubD、KVM switch
For security reasons a network technician wants to install a Linux based email server, Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hard ware costs?()A、VPN concentratorB、Virtual serversC、WirelessD、Multimode fiber
An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic. Which of the following settings would BEST provide additional monitoring security?()A、Setting up a custom community nameB、Configuring the network to block traffic on port 161C、Configuring the Windows Firewall to block port 161D、Setting SNMP to read only on the devicesE、Installing new MIBs
Which of the following provides the BEST security and accountability for a Data Center?()A、Entry loggingB、Combination locksC、Card keysD、Dead bolts
Which of the following commands would be used to display the IP address on a UNIX/Linux computer?()A、netstatB、ipconfigC、ifconfigD、dig
Which of the following would BEST optimize a computer that is heavily used? ()A、ScandiskB、DefragC、IndexingD、Chkdsk
Which of the following below would BEST optimize Windows XP startup?()A、Remove any unnecessary applications that start with Windows.B、Remove device drivers for unused peripherals.C、Disable the computer’s memory check in BIOS.D、Configure ScanDisk to run at startup.
Which of the following protocols would BEST grant the user secure access to a remote location?()A、VPNB、FTPC、POP3D、DNS
单选题For security reasons a network technician wants to install a Linux based email server, Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hard ware costs?()AVPN concentratorBVirtual serversCWirelessDMultimode fiber
单选题Which of the following provides the BEST security and accountability for a Data Center?()A Entry loggingB Combination locksC Card keysD Dead bolts
单选题Which of the following provides the BEST security and accountability for a Data Center?()AEntry loggingBCombination locksCCard keysDDead bolts
多选题An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic. Which of the following settings would BEST provide additional monitoring security?()ASetting up a custom community nameBConfiguring the network to block traffic on port 161CConfiguring the Windows Firewall to block port 161DSetting SNMP to read only on the devicesEInstalling new MIBs
单选题Which of the following commands would be used to display the IP address on a UNIX/Linux computer?()AnetstatBipconfigCifconfigDdig
单选题A user wants to be permanently added to the dba group. Which of the following commands or processes can be used to accomplish this()AchgrpBchuserCedit /etc/userDedit /etc/security/group
单选题Which of the following devices would allow a technician to utilize a single mouse, keyboard, and display to control numerous desktop PCs?()APort replicatorBDocking stationCUSB hubDKVM switch
单选题Which of the following below would BEST optimize Windows XP startup?()ARemove any unnecessary applications that start with Windows.BRemove device drivers for unused peripherals.CDisable the computer’s memory check in BIOS.DConfigure ScanDisk to run at startup.
单选题For the following attempts, which one is to ensure that no one employee becomes a pervasive securitythreat, that data can be recovered from backups, and that information system changes do not compromisea system’s security?()AStrategic security planningBDisaster recoveryCImplementation securityDOperations security
单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()AWEP encryptionBChannel rotationCDisable SSIDDWPA encryption
单选题Which of the following protocols would BEST grant the user secure access to a remote location?()AVPNBFTPCPOP3DDNS
单选题Which of the following would BEST optimize a computer that is heavily used? ()AScandiskBDefragCIndexingDChkdsk