Chinaunix首页 | 论坛 | 博客
  • 博客访问: 307850
  • 博文数量: 469
  • 博客积分: 2510
  • 博客等级: 少校
  • 技术积分: 5200
  • 用 户 组: 普通用户
  • 注册时间: 2008-06-03 16:15
文章分类

全部博文(469)

文章存档

2011年(82)

2010年(284)

2009年(69)

2008年(34)

我的朋友

分类:

2010-07-05 11:01:18

Security+ SY0-201考试题库由我们专业IT认证讲师及产品专家精心打造,包括了当前最新的全真SY0-201考试试题,全部附有正确答案。

1. Which of the following are the functions of asymmetric keys?
A. Decrypt, decipher, encode and encrypt
B. Sign, validate, encrypt and verify
C. Decrypt, validate, encode and verify
D. Encrypt, sign, decrypt and verify
Answer: D
2. When deploying 50 new workstations on the network, which of following should be completed FIRST?
A. Install a word processor.
B. Run the latest spyware.
C. Apply the baseline configuration.
D. Run OS updates.
Answer: C
3. A corporation has a contractual obligation to provide a certain amount of system uptime to a client.
Which of the following is this contract an example of?
A. PII
B. SLA
C. Due diligence
D. Redundancy
Answer: B
4. Snort, TCPDump and Wireshark are commonly used for which of the following?
A. Port scanning
B. Host monitoring
C. DDoS attacks
D. Network sniffing
Answer: D
5. Which of the following BEST describes using a third party to store the public and private keys?
A. Public key infrastructure
B. Recovery agent
C. Key escrow
D. Registration authority
Answer: C
6. All of the following can be found in the document retention policy EXCEPT:
A. type of storage media.
B. password complexity rules.
C. physical access controls.
D. retention periods.
Answer: B

 你可以到下载更多的SY0-201题库!

阅读(121) | 评论(0) | 转发(0) |
给主人留下些什么吧!~~