首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
标签
CISSP认证
Security countermeasures should be transparent to users and attackers. Which of the following does not describe transparency?
CISSP认证
admin
2013-12-19
29
0
Phishing and pharming are similar. Which of the following correctly describes the difference between phishing and pharming?
CISSP认证
admin
2013-12-19
34
0
Which of the following correctly describes a federated identity and its role within identity management processes?
CISSP认证
admin
2013-12-19
47
0
Emily is listening to network traffic and capturing passwords as they are sent to the authentication server. She plans to use th
CISSP认证
admin
2013-12-19
65
0
Brian has been asked to work on the virtual directory of his company’s new identity management system. Which of the following be
CISSP认证
admin
2013-12-19
50
0
What was the direct predecessor to Standard Generalized Markup Language(SGML)?
CISSP认证
admin
2013-12-19
32
0
Which of the following does not describe privacy-aware role-based access control?
CISSP认证
admin
2013-12-19
22
0
A number of attacks can be performed against smart cards. Side-channel is a class of attacks that doesn’t try to compromise a fl
CISSP认证
admin
2013-12-19
37
0
There are several types of password management approaches used by identity management systems. Which of the following reduces he
CISSP认证
admin
2013-12-19
55
0
Hannah has been assigned the task of installing Web access management(WAM) software. What is the best description for what WAM i
CISSP认证
admin
2013-12-19
43
0
Which of the following does not correctly describe a directory service?
CISSP认证
admin
2013-12-19
51
0
The following scenario will be used for questions 29 and 30. John is a network administrator and has been told by one of his net
CISSP认证
admin
2013-12-19
61
0
The following scenario will be used for questions 29 and 30. John is a network administrator and has been told by one of his net
CISSP认证
admin
2013-12-19
53
0
Bob is a new security administrator at a financial institution. The organization has experienced some suspicious activity on one
CISSP认证
admin
2013-12-19
31
0
______provides for availability and scalability. It groups physically different systems and combines them logically, which helps
CISSP认证
admin
2013-12-19
44
0
Which of the following is not considered a countermeasure to port scanning and operating system fingerprinting?
CISSP认证
admin
2013-12-19
48
0
There are several different types of important architectures within backup technologies. Which architecture does the graphic tha
CISSP认证
admin
2013-12-19
47
0
Mirroring of drives is when data is written to two drives at once for redundancy purposes. What similar type of technology is sh
CISSP认证
admin
2013-12-19
38
0
In a redundant array of inexpensive disks (RAID) systems, data and parity information are striped over several different disks.
CISSP认证
admin
2013-12-19
49
0
Guidelines should be followed to allow secure remote administration. Which of the following is not one of those guidelines?
CISSP认证
admin
2013-12-19
22
0
«
1
2
3
4
5
6
7
8
...21
»