南开大学

Members of Internet-based supply chains will need to evaluate their security needs and employ ()and other electronic security tools to protect confidential data.A、patentsB、passwordsC、telnetD、encryption technologies

题目
Members of Internet-based supply chains will need to evaluate their security needs and employ ()and other electronic security tools to protect confidential data.

A、patents

B、passwords

C、telnet

D、encryption technologies

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

ASystempadministratorneedstosetthedefaultpasswordlengthforalluserstosixcharacters.Whichofthefollowingfilesneedstobeeditedtoaccomplishthis()

A./etc/security/limits

B./etc/security/mkuser.sys

C./etc/security/priv

D./etc/security/user


参考答案:D

第2题:

ASystempadministratorisinvestigatingapossiblesecuritybreechandwantstoreviewinformationaboutfailedloginattemptstothesystem.Whichofthefollowingcommandswillshowthis()

A.fwtmp</etc/security/failedlogin

B.cat/etc/security/failedlogin

C.who

D.alog-f/etc/security/failedlogin-o


参考答案:A

第3题:

Asystemadministratorwantstoconfigureasystemsothatallnewuserswillbeputintothedatabasegroupbydefault.Howwouldthisbeaccomplished?()

A.removeallothergroupsfromthesystem

B.runthecommandmkuser-default"GROUP=database"

C.changethedefaultgroupin/usr/lib/security/mkuser.default

D.edit/etc/security/grouptomovealluserstothedatabasestanza


参考答案:C

第4题:

网络安全中“安全”的含义()。

A.security(安全)

B.security(安全)和safety(可靠)

C.safety(可靠)

D.risk(风险)


参考答案:B

第5题:

下面有关WS-Security标准的描述哪些是正确的?()

A.WS-Security加强了Web服务的消息完整性

B.WS-Security加强了Web服务的消息机密性

C.WS-Security可取代现有的数字签名技术

D.WS-Security本身提供了加密算法


参考答案:A, B

第6题:

Therootidissetsothatdirectloginisdisabled.Informationmustbereviewedrelatingtowhenrootaccesswasobtained.Inwhichofthefollowingfilesisthisinformationlocated?()

A./var/adm/sulog

B./var/adm/wtmp

C./etc/security/user

D./etc/security/failedlogin


参考答案:A

第7题:

Anadministratorwasaskedtologinformationonpossiblesecuritybreachesonaserver.Towhichfileshouldadditionalentriesbeaddedtocapturethisinformation()

A./var/adm/sulog

B./etc/syslog.conf

C./etc/security/sysck.cfg

D./etc/security/syslog.conf


参考答案:B

第8题:

Asystemadministratorwasaskedtologinformationonpossiblesecuritybreachesonaserver.Whichfileshouldadditionalentriesbeaddedtocapturethisinformation?()

A./var/adm/sulog

B./etc/syslog.conf

C./etc/security/sysck.cfg

D./etc/security/login.cfg


参考答案:B

第9题:

WhatbestdescribesthefeaturesoftheCisco850Seriesrouters?()

A.integratesdata,security,andwireless

B.integratesdata,ecurity,wirelessandapplicationoptimization

C.integratesvoice,data,security,wirelessandapplicationoptimization

D.integratesdataandwireless


参考答案:A

第10题:


According to Para.7,which of the following is not the way that passage suggests to improve cyber-security?( )

A.Be quick to predict and respond when there is insecurity.
B.Make sure everyone is equipped with fundamental knowledge of cyber-security.
C.Be cooperative with counterparts on cyber-security.
D.Be cautious using Internet.

答案:D
解析: