Install a new operating system
Delete users’ data before donation
Write the drive with 1’s and 0’s three times
Delete all partitions of the hard drive
第1题:
Your company network has 500 client computers that run Windows 7. Your team consists of 20 desktop support technicians. Two technicians troubleshoot a hardware-related performance issue on a computer. The technicians obtain different results by using their own User Defined Data Collector Sets. You need to create a standardized Data Collector Set on a network share that is accessible to your team. What should you create?()
A.Event Trace Data Collector Set
B.Performance Counter Data Collector Set
C.Performance Counter Alert Data Collector Set
D.System Configuration Information Data Collector Set
第2题:
The communication management plan determines the information and communications needs of the stakeholders. In the following statements related to communication management plan. ( ) is false.
第3题:
The security team has implemented new guidelines on how to handle sensitive information storedon workstations based on a past incident involving information found on donated workstations.Which of the following should be completed by technicians before donating the workstations?()
第4题:
A technician works in a datacenter that is shared by multiple companies. The technician isconcerned with preventing the theft of proprietary information by other technicians with access to the datacenter. Which of the following is the BEST way to prevent data theft in this scenario?()
第5题:
The pSeries technical specialist has been invited to a briefing on the latest POWER technology as a representative of their team. What should the specialist offer to do upon return from class in order to best prepare the rest of the team for the introduction of the new technology?()
第6题:
A technician is servicing the Human Resource director’s computer which contains payroll software and salary information. Which of the following should the technician do to ensure confidentiality of the payroll information?()
第7题:
Media should be erased
Media should be shredded
Media should be exposed to UV
Media should be formatted
第8题:
Event Viewer
MSCONFIG
Services MMC
Group Policy Editor
第9题:
The communication management plan is contained in or is a subsidiary plan of, the project management plan.
The communication management plan can be formal or informal, highly detailed or broadly framed, and based on the needs of the project.
The communication manamgement plan organize and summarize the information gathered,and present the results of any analysis as comparedthe performance measurement baseline.
The communication management plan can include guidelines project status meetings,project team meetings,e-meetines,and e-mail
第10题:
CREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password'
CREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password',CHECK_POLICY = OFF
CREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password'[HASHED]
CREATE LOGIN [CONTOSO/pentest]FROM WINDOWS CREATE LOGIN [CONTOSO/hacktest]FROM WINDOWS
第11题:
Data owner 数据拥有者
Auditor 审计员
The information security specialist 信息安全专家
Senior management 高级管理者
第12题:
the security of information on the network used to be a worry.
all the data should be stored on the same system.
the company’s computer-based information is well-protected.
第13题:
Who should DECIDE how a company should approach security and what security measures should be implemented?谁应该决定一个公司应该如何对待安全以及实施什么样的安全措施?()
第14题:
Your web application uses a simple architecture in which servlets handle requests and then forward to aJSP using a request dispatcher. You need to pass information calculated by the servlet to the JSP;furthermore, that JSP uses a custom tag and must also process this information. This information mustNOT be accessible to any other servlet, JSP or session in the webapp. How can you accomplish this goal?()
第15题:
Which of the following is the MOST secure and efficient way to dispose of rewritable DVD media containing sensitive information?()
第16题:
A technician is troubleshooting a workstation that has the wrong time information. All workstations should be pointing to a central NTP server. Which of the following locations would the technician check to investigate error messages related to this issue?()
第17题:
Your company network has 500 client computers that run Windows 7. Your team consists of 20 desktop support technicians. Two technicians troubleshoot a hardware-related performance issue on a computer. The technicians obtain different results by using their own User Defined Data Collector Sets. You need to create a standardized Data Collector Set on a network share that is accessible to your team. What should you create?()
第18题:
Install a new operating system
Delete users’ data before donation
Write the drive with 1’s and 0’s three times
Delete all partitions of the hard drive
第19题:
Archive the materials in the team’s library.
Act as the sole technical resource for the team.
Summarize the information and make it available to the team.
Evaluate the class and recommend attendance to other team members.
第20题:
Store the data in a public instance variable in the servlet.
Add an attribute to the request object before using the request dispatcher.
Add an attribute to the context object before using the request dispatcher.
This CANNOT be done as the tag handler has no means to extract this data.
第21题:
Backup the confidential data to the technician’s USB drive to ensure nothing is accidently deleted.
Uninstall the payroll software to ensure confidentiality.
Have the director remove sensitive data before the computer will be repaired.
Perform needed repairs while avoiding sensitive data.
第22题:
Vendor customer satisfaction ratings
OEM contact information
Time vendor has been in business
Annual spending budget with the vendor
第23题:
Event Trace Data Collector Set
Performance Counter Data Collector Set
Performance Counter Alert Data Collector Set
System Configuration Information Data Collector Set
第24题:
IIS log
Application log
System log
Security log