itgle.com

单选题The security team has implemented new guidelines on how to handle sensitive information storedon workstations based on a past incident involving information found on donated workstations.Which of the following should be completed by technicians before

题目
单选题
The security team has implemented new guidelines on how to handle sensitive information storedon workstations based on a past incident involving information found on donated workstations.Which of the following should be completed by technicians before donating the workstations?()
A

Install a new operating system

B

Delete users’ data before donation

C

Write the drive with 1’s and 0’s three times

D

Delete all partitions of the hard drive


相似考题
更多“单选题The security team has implemented new guidelines on how to handle sensitive information storedon workstations based on a past incident involving information found on donated workstations.Which of the following should be completed by technicians before ”相关问题
  • 第1题:

    Your company network has 500 client computers that run Windows 7. Your team consists of 20 desktop support technicians. Two technicians troubleshoot a hardware-related performance issue on a computer. The technicians obtain different results by using their own User Defined Data Collector Sets. You need to create a standardized Data Collector Set on a network share that is accessible to your team. What should you create?()

    A.Event Trace Data Collector Set

    B.Performance Counter Data Collector Set

    C.Performance Counter Alert Data Collector Set

    D.System Configuration Information Data Collector Set


    参考答案:B

  • 第2题:

    The communication management plan determines the information and communications needs of the stakeholders. In the following statements related to communication management plan. ( ) is false.

    • A、The communication management plan is contained in or is a subsidiary plan of, the project management plan.
    • B、The  communication  management  plan  can  be  formal  or informal, highly detailed or broadly framed, and based on the needs of the project.
    • C、The  communication  manamgement  plan  organize  and summarize the information gathered,and present the results of any analysis as comparedthe performance measurement baseline.
    • D、The communication management plan can include guidelines project status meetings,project team meetings,e-meetines,and e-mail

    正确答案:C

  • 第3题:

    The security team has implemented new guidelines on how to handle sensitive information storedon workstations based on a past incident involving information found on donated workstations.Which of the following should be completed by technicians before donating the workstations?()

    • A、Install a new operating system
    • B、Delete users’ data before donation
    • C、Write the drive with 1’s and 0’s three times
    • D、Delete all partitions of the hard drive

    正确答案:C

  • 第4题:

    A technician works in a datacenter that is shared by multiple companies. The technician isconcerned with preventing the theft of proprietary information by other technicians with access to the datacenter. Which of the following is the BEST way to prevent data theft in this scenario?()

    • A、Mantraps
    • B、Two-factor authentication
    • C、Security personnel
    • D、Locked rack doors

    正确答案:D

  • 第5题:

    The pSeries technical specialist has been invited to a briefing on the latest POWER technology as a representative of their team.  What should the specialist offer to do upon return from class in order to best prepare the rest of the team for the introduction of the new technology?()

    • A、Archive the materials in the team’s library.
    • B、Act as the sole technical resource for the team.
    • C、Summarize the information and make it available to the team.
    • D、Evaluate the class and recommend attendance to other team members.

    正确答案:C

  • 第6题:

    A technician is servicing the Human Resource director’s computer which contains payroll software and salary information. Which of the following should the technician do to ensure confidentiality of the payroll information?()

    • A、Backup the confidential data to the technician’s USB drive to ensure nothing is accidently deleted.
    • B、Uninstall the payroll software to ensure confidentiality.
    • C、Have the director remove sensitive data before the computer will be repaired.
    • D、Perform needed repairs while avoiding sensitive data.

    正确答案:D

  • 第7题:

    单选题
    Which of the following is the MOST secure and efficient way to dispose of rewritable DVD media containing sensitive information?()
    A

    Media should be erased

    B

    Media should be shredded

    C

    Media should be exposed to UV

    D

    Media should be formatted


    正确答案: D
    解析: 暂无解析

  • 第8题:

    单选题
    A technician is sent out to a client’s office to solve an issue involving a machine which has numerous Windows XP service failures upon startup. Which of the following would be the FIRST place to check for information on this?()
    A

    Event Viewer

    B

    MSCONFIG

    C

    Services MMC

    D

    Group Policy Editor


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    The communication management plan determines the information and communications needs of the stakeholders. In the following statements related to communication management plan. ( ) is false.
    A

    The communication management plan is contained in or is a subsidiary plan of, the project management plan.

    B

    The  communication  management  plan  can  be  formal  or informal, highly detailed or broadly framed, and based on the needs of the project.

    C

    The  communication  manamgement  plan  organize  and summarize the information gathered,and present the results of any analysis as comparedthe performance measurement baseline.

    D

    The communication management plan can include guidelines project status meetings,project team meetings,e-meetines,and e-mail


    正确答案: A
    解析: 沟通管理计划用于确定项目千系人的信息需求和沟通方法,以下关于沟通管理计划的叙述中,错误的是:沟通管理计划定期收集、对比和分析基准与实际数据,以便了解和沟通项目进展与绩效情况。 A:沟通管理计划是项目管理计划的一部分或子计划 B:沟通管理计划可以根据项目需求是正式或非正式的、非常详细或高度概括的。 C://沟通管理计划定期收集、对比和分析基准与实际数据,以便了解和沟通项目进展与绩效情况。 D://沟通管理计划可包括关于状态会议、项目团队回忆、网络会议和电子邮件等的指南。

  • 第10题:

    单选题
    You are the administrator of a Microsoft Windows Server 2003 computer named SQL1. SQL1 runs SQL Server 2005 and is a member of a Microsoft Active Directory domain named Contoso.com. The domain is configured with all of the default settings. Several members of the information security team have requested access to SQL1. The information security team uses the Microsoft Windows XP Professional, Linux, and Macintosh operating systems to perform vulnerability assessments. The information security team members ask you to create two new logon accounts for their use. They would like the logon accounts to have the following user names and passwords: User name/password for first account: pentest/P@ssw0rdUser name/password for second account: hacktest/password You need to provide the information security team with the requested access to SQL1.  Which Transact-SQL script should you use?()
    A

    CREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password'

    B

    CREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password',CHECK_POLICY = OFF

    C

    CREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password'[HASHED]

    D

    CREATE LOGIN [CONTOSO/pentest]FROM WINDOWS CREATE LOGIN [CONTOSO/hacktest]FROM WINDOWS 


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    Who should DECIDE how a company should approach security and what security measures should be implemented?谁应该决定一个公司应该如何对待安全以及实施什么样的安全措施?()
    A

    Data owner 数据拥有者

    B

    Auditor 审计员

    C

    The information security specialist 信息安全专家

    D

    Senior management 高级管理者


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    Stephen Smith feels that
    A

    the security of information on the network used to be a worry.

    B

    all the data should be stored on the same system.

    C

    the company’s computer-based information is well-protected.


    正确答案: C
    解析:
    倒数第二段讲到了系统的安全问题。Smith说到,他们在他们自己内部的安全系统里运行这个软件,数据是在一个特殊的“sandbox”,而这个“sandbox”是与剩余的系统分开的。由此可知,公司的计算机信息是受到良好保护的,所以选C。

  • 第13题:

    Who should DECIDE how a company should approach security and what security measures should be implemented?谁应该决定一个公司应该如何对待安全以及实施什么样的安全措施?()

    • A、Data owner 数据拥有者
    • B、Auditor 审计员
    • C、The information security specialist 信息安全专家
    • D、Senior management 高级管理者

    正确答案:D

  • 第14题:

    Your web application uses a simple architecture in which servlets handle requests and then forward to aJSP using a request dispatcher. You need to pass information calculated by the servlet to the JSP;furthermore, that JSP uses a custom tag and must also process this information. This information mustNOT be accessible to any other servlet, JSP or session in the webapp. How can you accomplish this goal?()

    • A、Store the data in a public instance variable in the servlet.
    • B、Add an attribute to the request object before using the request dispatcher.
    • C、Add an attribute to the context object before using the request dispatcher.
    • D、This CANNOT be done as the tag handler has no means to extract this data.

    正确答案:B

  • 第15题:

    Which of the following is the MOST secure and efficient way to dispose of rewritable DVD media containing sensitive information?()

    • A、Media should be erased
    • B、Media should be shredded
    • C、Media should be exposed to UV
    • D、Media should be formatted

    正确答案:B

  • 第16题:

    A technician is troubleshooting a workstation that has the wrong time information. All workstations should be pointing to a central NTP server. Which of the following locations would the technician check to investigate error messages related to this issue?()

    • A、IIS log
    • B、Application log
    • C、System log
    • D、Security log

    正确答案:C

  • 第17题:

    Your company network has 500 client computers that run Windows 7. Your team consists of 20 desktop support technicians. Two technicians troubleshoot a hardware-related performance issue on a computer. The technicians obtain different results by using their own User Defined Data Collector Sets. You need to create a standardized Data Collector Set on a network share that is accessible to your team. What should you create?()

    • A、Event Trace Data Collector Set
    • B、Performance Counter Data Collector Set
    • C、Performance Counter Alert Data Collector Set
    • D、System Configuration Information Data Collector Set

    正确答案:B

  • 第18题:

    单选题
    The security team has implemented new guidelines on how to handle sensitive information storedon workstations based on a past incident involving information found on donated workstations.Which of the following should be completed by technicians before donating the workstations?()
    A

    Install a new operating system

    B

    Delete users’ data before donation

    C

    Write the drive with 1’s and 0’s three times

    D

    Delete all partitions of the hard drive


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    The pSeries technical specialist has been invited to a briefing on the latest POWER technology as a representative of their team.  What should the specialist offer to do upon return from class in order to best prepare the rest of the team for the introduction of the new technology?()
    A

    Archive the materials in the team’s library.

    B

    Act as the sole technical resource for the team.

    C

    Summarize the information and make it available to the team.

    D

    Evaluate the class and recommend attendance to other team members.


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    Your web application uses a simple architecture in which servlets handle requests and then forward to aJSP using a request dispatcher. You need to pass information calculated by the servlet to the JSP;furthermore, that JSP uses a custom tag and must also process this information. This information mustNOT be accessible to any other servlet, JSP or session in the webapp. How can you accomplish this goal?()
    A

    Store the data in a public instance variable in the servlet.

    B

    Add an attribute to the request object before using the request dispatcher.

    C

    Add an attribute to the context object before using the request dispatcher.

    D

    This CANNOT be done as the tag handler has no means to extract this data.


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    A technician is servicing the Human Resource director’s computer which contains payroll software and salary information. Which of the following should the technician do to ensure confidentiality of the payroll information?()
    A

    Backup the confidential data to the technician’s USB drive to ensure nothing is accidently deleted.

    B

    Uninstall the payroll software to ensure confidentiality.

    C

    Have the director remove sensitive data before the computer will be repaired.

    D

    Perform needed repairs while avoiding sensitive data.


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    When creating a list of vendors, which of the following information should be included?()
    A

    Vendor customer satisfaction ratings

    B

    OEM contact information

    C

    Time vendor has been in business

    D

    Annual spending budget with the vendor


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Your company network has 500 client computers that run Windows 7. Your team consists of 20 desktop support technicians. Two technicians troubleshoot a hardware-related performance issue on a computer. The technicians obtain different results by using their own User Defined Data Collector Sets. You need to create a standardized Data Collector Set on a network share that is accessible to your team. What should you create?()
    A

    Event Trace Data Collector Set

    B

    Performance Counter Data Collector Set

    C

    Performance Counter Alert Data Collector Set

    D

    System Configuration Information Data Collector Set


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    A technician is troubleshooting a workstation that has the wrong time information. All workstations should be pointing to a central NTP server. Which of the following locations would the technician check to investigate error messages related to this issue?()
    A

    IIS log

    B

    Application log

    C

    System log

    D

    Security log


    正确答案: D
    解析: 暂无解析