itgle.com
参考答案和解析
正确答案:D
39. D
上下文中 also 一词提示天空处需要 be capable of的近义词,所以 possess the ability 符合题意。
更多“[A] access [B] assess[C] process[D] possess ”相关问题
  • 第1题:

    面向服务系统构建过程中,( )用于实现Web服务的远程调用,( )用来将分散的、功能单一的Web服务组织成一个复杂的有机应用。

    A.UDDI(Universal Description,Discovery and Integration) B.WSDL(Web Service Description Language)C.SOAP(Simple Object Access Protocol)D.BPEL(Business Process Execution Language) A.UDDI(Universal Description,Discovery and Integration)B.WSDL(Web Service Description Language) C.SOAP(Simple Object Access Protocol)D.BPEL(Business Process Execution Language)


    正确答案:C,D

  • 第2题:

    What can be done to secure the virtual terminal interfaces on a router?()

    A. Administratively shut down the interface.

    B. Physically secure the interface.

    C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.

    D. Configure a virtual terminal password and login process.

    E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.


    参考答案:D, E

  • 第3题:

    In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization (授权).
    An access control mechanism (71) between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is (72) to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(73)access. An auditing function monitors and keeps a record of user accesses to system resources.
    In practice, a number of(74)may cooperatively share the access control function. All operating systems have at least a rudimentary(基本的), and in many cases a quite robust, access control component. Add-on security packages can add to the(75)access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services.

    A.open
    B.monitor
    C.grant
    D.seek

    答案:C
    解析:
    在物理安全和信息安全领域,访问控制是对一个地方或其他资源的访问限制。访问的行为可能意味着消费、输入或使用。允许访问资源被称为授权。
    访问控制机制连接用户(代表用户执行的进程)和系统资源(如应用程序、操作系统、防火墙、路由器、文件和数据库)之间的连接。系统必须首先对用户进行身份验证。通常,身份验证功能决定用户是否被允许访问系统。然后,访问控制功能决定是否允许该用户指定的访问权限。安全管理员维护一个授权数据库,该数据库指定允许该用户访问哪些资源的类型。访问控制函数咨询此数据库以确定是否授予访问权。审计功能监视并保存用户访问系统资源的记录。
    在实践中,一些用户可以合作共享访问控制函数。所有操作系统都至少有一个基本的,而且在许多情况下是一个相当健壮的访问控制组件。附加安全包可以添加到操作系统的自动访问控制功能。特定的应用程序或实用程序,如数据库管理系统,也包括访问控制功能。外部设备,如防火墙,也可以提供访问控制服务。

  • 第4题:

    In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization (授权).
    An access control mechanism (71) between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is (72) to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(73)access. An auditing function monitors and keeps a record of user accesses to system resources.
    In practice, a number of(74)may cooperatively share the access control function. All operating systems have at least a rudimentary(基本的), and in many cases a quite robust, access control component. Add-on security packages can add to the(75)access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services.

    A.remote
    B.native
    C.controlled
    D.automated

    答案:D
    解析:
    在物理安全和信息安全领域,访问控制是对一个地方或其他资源的访问限制。访问的行为可能意味着消费、输入或使用。允许访问资源被称为授权。
    访问控制机制连接用户(代表用户执行的进程)和系统资源(如应用程序、操作系统、防火墙、路由器、文件和数据库)之间的连接。系统必须首先对用户进行身份验证。通常,身份验证功能决定用户是否被允许访问系统。然后,访问控制功能决定是否允许该用户指定的访问权限。安全管理员维护一个授权数据库,该数据库指定允许该用户访问哪些资源的类型。访问控制函数咨询此数据库以确定是否授予访问权。审计功能监视并保存用户访问系统资源的记录。
    在实践中,一些用户可以合作共享访问控制函数。所有操作系统都至少有一个基本的,而且在许多情况下是一个相当健壮的访问控制组件。附加安全包可以添加到操作系统的自动访问控制功能。特定的应用程序或实用程序,如数据库管理系统,也包括访问控制功能。外部设备,如防火墙,也可以提供访问控制服务。

  • 第5题:

    A new lightweight access point (LAP) has been installed in the Company WLAN.  Which two  statements correctly describe the association process between this LAP and a WLAN controller? ()

    • A、 An access point will search for a controller using a broadcast address if using LWAPP Layer 2  and a unicast address if using LWAPP Layer 3 mode.
    • B、 If multiple wireless controllers are detected by an access point, the controller with the fewest  associated access points is chosen to associate with.
    • C、 In order to associate in Layer 3 mode, the access point must have been preconfigured with an  IP address.
    • D、 Once an access point associates with a controller in LWAPP Layer 3 mode, it receives an IP  address from the controller.
    • E、 An access point first searches for a controller in LWAPP Layer 2 mode. If the search is not  successful, the access point then attempts to locate a controller in LWAPP Layer 3 mode.
    • F、 If multiple wireless controllers are detected by an access point, all of them will be used and  traffic will be load balanced.

    正确答案:B,E

  • 第6题:

    When conducting an Assisted Site Survey, the WLSE does which of the following during the Radio Scan process?()

    • A、chooses the least congested channel
    • B、uses the configured channel
    • C、sets all access points to the same channel
    • D、steps through each of the allowed channels

    正确答案:C

  • 第7题:

    Which can be done to secure the virtual terminal interfaces on a router?()

    • A、Administratively shut down the interfaces.
    • B、Physically secure the interfaces.
    • C、Configure a virtual terminal password and login process.
    • D、Enter an access list and apply it to the terminal interfaces using the access-class command.
    • E、Create an access list and apply it to the terminal interfaces using the access-group command

    正确答案:C,D

  • 第8题:

    A client is searching for an access point (AP). What is the correct process order that the client and  access point go through to create a connection?()

    • A、 probe request/response, authentication request/response, association request/response
    • B、 association request/response, authentication request/response, probe request/response
    • C、 probe request/response, association request/response, authentication request/response
    • D、 association request/response, probe request/response, authentication request/response

    正确答案:A

  • 第9题:

    An administrator logs into a server and notices slow performance.While troubleshooting the problem the administrator notices that an unfamiliar process in the Task Manager is running at 100% CPU usage.The administrator tries to end the task and receives ‘Access is denied’.  Which of the following steps would allow the administrator to terminate that process?()

    • A、Adding the ‘Run as a service’ permission to their account.
    • B、Running the kill utility.
    • C、Adding their account to the remote users group.
    • D、Ending the services.exe process then ending the runaway process.

    正确答案:B

  • 第10题:

    多选题
    You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()
    A

    Administratively shut down the interface.

    B

    Physically secure the interface.

    C

    Create an access list and apply it to the virtual terminal interfaces with the access-group command.

    D

    Configure a virtual terminal password and login process.

    E

    Enter an access list and apply it to the virtual terminal interfaces using the access-class command.


    正确答案: D,E
    解析: 暂无解析

  • 第11题:

    多选题
    What can be done to secure the virtual terminal interfaces on a router?()
    A

    Administratively shut down the interface.

    B

    Physically secure the interface.

    C

    Create an access list and apply it to the virtual terminal interfaces with the access-group command.

    D

    Configure a virtual terminal password and login process.

    E

    Enter an access list and apply it to the virtual terminal interfaces using the access-class command.


    正确答案: B,D
    解析: 暂无解析

  • 第12题:

    单选题
    An administrator logs into a server and notices slow performance.While troubleshooting the problem the administrator notices that an unfamiliar process in the Task Manager is running at 100% CPU usage.The administrator tries to end the task and receives ‘Access is denied’.  Which of the following steps would allow the administrator to terminate that process?()
    A

    Adding the ‘Run as a service’ permission to their account.

    B

    Running the kill utility.

    C

    Adding their account to the remote users group.

    D

    Ending the services.exe process then ending the runaway process.


    正确答案: B
    解析: 暂无解析

  • 第13题:

    You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()

    A. Administratively shut down the interface.

    B. Physically secure the interface.

    C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.

    D. Configure a virtual terminal password and login process.

    E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.


    参考答案:D, E

  • 第14题:

    Perform Quality Control is the process of monitoring and recording results*of executing the Quality Plan activities to assess performance and recommend necessary changes.() are the techniques and tools in performing quality control① Statistical sampling ② Run chart③ Control charts ④ Critical Path Method⑤ Pareto chart⑥ Cause and effect diagrams

    A.①②③④
    B.②③④⑤
    C.①②③⑤⑥
    D.①③④⑤⑥

    答案:C
    解析:
    实现项目质量控制的方法、技术和工具包括统计抽样(Statistical sampling)、运行图 (Run chart)、控制图(Control charts)、帕累托图(Pareto chart),以及因果图(Cause and effect diagrams)等。关键路径法(Critical Path Method)是制定项目进度计划的方法,因此选C。

  • 第15题:

    In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization (授权).
    An access control mechanism (71) between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is (72) to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(73)access. An auditing function monitors and keeps a record of user accesses to system resources.
    In practice, a number of(74)may cooperatively share the access control function. All operating systems have at least a rudimentary(基本的), and in many cases a quite robust, access control component. Add-on security packages can add to the(75)access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services.

    A.cooperates
    B.coordinates
    C.connects
    D.mediates

    答案:C
    解析:
    在物理安全和信息安全领域,访问控制是对一个地方或其他资源的访问限制。访问的行为可能意味着消费、输入或使用。允许访问资源被称为授权。
    访问控制机制连接用户(代表用户执行的进程)和系统资源(如应用程序、操作系统、防火墙、路由器、文件和数据库)之间的连接。系统必须首先对用户进行身份验证。通常,身份验证功能决定用户是否被允许访问系统。然后,访问控制功能决定是否允许该用户指定的访问权限。安全管理员维护一个授权数据库,该数据库指定允许该用户访问哪些资源的类型。访问控制函数咨询此数据库以确定是否授予访问权。审计功能监视并保存用户访问系统资源的记录。
    在实践中,一些用户可以合作共享访问控制函数。所有操作系统都至少有一个基本的,而且在许多情况下是一个相当健壮的访问控制组件。附加安全包可以添加到操作系统的自动访问控制功能。特定的应用程序或实用程序,如数据库管理系统,也包括访问控制功能。外部设备,如防火墙,也可以提供访问控制服务。

  • 第16题:

    In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization (授权).
    An access control mechanism (71) between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is (72) to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(73)access. An auditing function monitors and keeps a record of user accesses to system resources.
    In practice, a number of(74)may cooperatively share the access control function. All operating systems have at least a rudimentary(基本的), and in many cases a quite robust, access control component. Add-on security packages can add to the(75)access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services.

    A.components
    B.users
    C.mechanisms
    D.algorithms

    答案:B
    解析:
    在物理安全和信息安全领域,访问控制是对一个地方或其他资源的访问限制。访问的行为可能意味着消费、输入或使用。允许访问资源被称为授权。
    访问控制机制连接用户(代表用户执行的进程)和系统资源(如应用程序、操作系统、防火墙、路由器、文件和数据库)之间的连接。系统必须首先对用户进行身份验证。通常,身份验证功能决定用户是否被允许访问系统。然后,访问控制功能决定是否允许该用户指定的访问权限。安全管理员维护一个授权数据库,该数据库指定允许该用户访问哪些资源的类型。访问控制函数咨询此数据库以确定是否授予访问权。审计功能监视并保存用户访问系统资源的记录。
    在实践中,一些用户可以合作共享访问控制函数。所有操作系统都至少有一个基本的,而且在许多情况下是一个相当健壮的访问控制组件。附加安全包可以添加到操作系统的自动访问控制功能。特定的应用程序或实用程序,如数据库管理系统,也包括访问控制功能。外部设备,如防火墙,也可以提供访问控制服务。

  • 第17题:

    You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()

    • A、Administratively shut down the interface.
    • B、Physically secure the interface.
    • C、Create an access list and apply it to the virtual terminal interfaces with the access-group command.
    • D、Configure a virtual terminal password and login process.
    • E、Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

    正确答案:D,E

  • 第18题:

    You use a shared Windows 2000 Professional Computer. You notice, that some of your Microsoft Word documents that were on the local hard drive have been deleted. You restore the documents from a recent backup. Now, you want to be able to track all users who access your Word documents in the future. What should you do? ()

    • A、Enable the local Group Policy for auditing object access events that are successful.
    • B、Enable the local Group Policy for auditing object access events that are unsuccessful.
    • C、Enable the local Group Policy for auditing process tracking events that are successful.
    • D、Enable the local Group Policy for auditing process tracking events that are unsuccessful. 
    • E、Use Windows 2000 Explorer, to enable auditing for your files.
    • F、Run the diskperf - y command. Use System Monitor to examine the logical I/O counter.  Restart the Computer.

    正确答案:A,E

  • 第19题:

    Which can be done to secure the virtual terminal interfaces on a router?()

    • A、Administratively shut down the interfaces.
    • B、Physically secure the interfaces.
    • C、Configure a virtual terminal password and login process.
    • D、Enter an access list and apply it to the terminal interfaces using the access-class command.
    • E、Create an access list and apply it to the terminal interfaces using the access-group command.

    正确答案:C,D

  • 第20题:

    Which can be done to secure the virtual terminal interfaces on a router?()

    • A、Administratively shut down the interfaces.
    • B、Physically secure the interfaces.
    • C、Configure a virtual terminal password and login process.
    • D、Enter an access list and applyit to the terminal interfaces using theaccess-class command.
    • E、Create an access list and applyit to the terminal interfaces using theaccess-group command.

    正确答案:C,D

  • 第21题:

    Your company has file servers located in an organizational unit named Payroll. The file servers  contain payroll files located in a folder named Payroll.     You create a GPO. You need to track which employees access the Payroll files on the file  servers.   What should you do()    

    • A、Enable the Audit object access option. Link the GPO to the Payroll organizational unit. On the file servers, configure
    • B、Enable the Audit object access option. Link the GPO to the domain. On the domain controllers, configure Auditing f
    • C、Enable the Audit process tracking option. Link the GPO to the Domain Controllers organizational unit. On the file se
    • D、Enable the Audit process tracking option. Link the GPO to the Payroll organizational unit. On the file servers, config

    正确答案:A

  • 第22题:

    多选题
    Which can be done to secure the virtual terminal interfaces on a router?()
    A

    Administratively shut down the interfaces.

    B

    Physically secure the interfaces.

    C

    Configure a virtual terminal password and login process.

    D

    Enter an access list and applyit to the terminal interfaces using theaccess-class command.

    E

    Create an access list and applyit to the terminal interfaces using theaccess-group command.


    正确答案: C,D
    解析: 暂无解析

  • 第23题:

    多选题
    Which can be done to secure the virtual terminal interfaces on a router?()
    A

    Administratively shut down the interfaces.

    B

    Physically secure the interfaces.

    C

    Configure a virtual terminal password and login process.

    D

    Enter an access list and apply it to the terminal interfaces using the access-class command.

    E

    Create an access list and apply it to the terminal interfaces using the access-group command.


    正确答案: D,C
    解析: 暂无解析