单项选择题
For the following attempts, which one is to ensure that no one employee becomes a pervasive securitythreat, that data can be recovered from backups, and that information system changes do not compromisea system’s security?()
A.Strategic security planning
B.Disaster recovery
C.Implementation security
D.Operations security
点击查看答案
相关考题
-
单项选择题
WhichoneofthefollowingcommandscanbeusedtoenableAAAauthenticationtodetermineifausercanaccesstheprivilegecommandlevel?()
A.aaa authentication enable method default
B.aaa authentication enable default
C.aaa authentication enable level
D.aaa authentication enable default local -
单项选择题
WhichtypeoffirewallisneededtoopenappropriateUDPportsrequiredforRTPstreams?()
A.Stateful firewall
B.Proxy firewall
C.Packet filtering firewall
D.Stateless firewall -
单项选择题
Forthefollowingstatements,whichoneisperceivedasadrawbackofimplementingFibreChannelAuthenticationProtocol(FCAP)?()
A.It is restricted in size to only three segments
B.It requires the use of netBT as the network protocol
C.It requires the implementation of IKE
D.It relies on an underlying Public Key Infrastructure
