features
efforts
changes
attempts
单选题For the following attempts, which one is to ensure that no one employee becomes a pervasive securitythreat, that data can be recovered from backups, and that information system changes do not compromisea system’s security?()A Strategic security planningB Disaster recoveryC Implementation securityD Operations security
点击查看答案
单选题Which of the following features sets IBM apart from competitors in the area of partitioning?()A Software supportB Hardware isolationC Static changes in partitionsD Micro-Partitioning
单选题The merchant undertakes that no claim or allegation shall be made against any servant,agent or subcontractor of the carrier which()to impose upon any of them or any liability whatsoever in connection with the goods.A supplies or attempts to supplyB imposes or attemptsC complies or attempts to complyD provides or attempts to provide
多选题Your company has a server that runs Windows Server 2008 R2. Active Directory Certificate Services (AD CS) is configured as a standalone Certification Authority (CA) on the server. You need to audit changes to the CA configuration settings and the CA security settings. Which two tasks should you perform()AConfigure auditing in the Certification Authority snap-in.BEnable auditing of successful and failed attempts to change permissions on files in the %SYSTEM32%/CertSrv direCEnable auditing of successful and failed attempts to write to files in the %SYSTEM32%/CertLog directory.DEnable the Audit object access setting in the Local Security Policy for the Active Directory Certificate Services
单选题Which item is the most important factor during deployment of high-availability features?()A Test major changes before deployment and defer minor changes until during deployment. B Document and verify rollback procedures.C Ensure consistency of code versions across the network.D Progressively modify procedures and documentation during implementation.
单选题Your database initialization parameter file has the following entry: SEC_MAX_FAILED_LOGIN_ATTEMPTS=3 Which statement is true regarding this setting?()AIt drops the connection after the specified number of login attempts fail for any user.BIt is enforced only if the password profile is enabled for the user.CIt locks the user account after the specified number of attempts.DIt drops the connection after the specified number of login attempts fail only for users who have the SYSDBA privilege.
单选题When preparing benefit changes, companies shouldA treat employees as customers.B stress the benefits of the changes.C talk employees into accepting the changes.D act quickly according to the reactions of employees.