Chinaunix首页 | 论坛 | 博客
  • 博客访问: 288976
  • 博文数量: 469
  • 博客积分: 2510
  • 博客等级: 少校
  • 技术积分: 5200
  • 用 户 组: 普通用户
  • 注册时间: 2008-06-03 16:15
文章分类

全部博文(469)

文章存档

2011年(82)

2010年(284)

2009年(69)

2008年(34)

我的朋友

分类:

2010-12-27 11:00:30

题库考试题库由我们专业IT认证讲师及产品专家精心打造,包括了当前最新的全真考试试题,全部附有正确答案。题库的覆盖率在96%以上,在考试认证厂商对考题做出变化时,网站都将在第一时间内更新,最终确保考生能一次通过!

  以下是题库的部分题目:

1.Which statement reflects a risk-based security program?

A. We are in the process of identifying the effectiveness of the security in our PCI environment.

B. We are in the process of identifying the business impact related to our PCI environment.

C. We are in the process of identifying the appropriate controls related to our PCI environment.

D. We are in the process of identifying the systems impacted by PCI regulations.

Answer: B

2.How can a security professional within an organization become viewed as a business partner to an executive?

A. by speaking to security roles and processes

B. by articulating risk in terms of financial value

C. by speaking to the fundamentals of security

D. by ensuring that compliance is the top priority

Answer: B

3.What drives consultative conversations and establishes credibility with an organization?

A. establishing a security policy

B. providing industry insight

C. providing regulatory information

D. establishing technical controls

Answer: B

4.What is one of the common security concerns among organizations today, according to the Global State of Information Security survey 2010?

A. quality of service

B. PCI compliance

C. data protection

D. asset management

Answer: C

5.Which two process types form the basis for the development of a workflow solution? (Select two.)

A. production processes

B.security processes

C.business processes

D.monitoring processes

E.automation processes

Answer: C, E

6.What is the benefit that a workflow solution provides for the security of an environment?

A. It allows the ability to react to security events in a timely and automated fashion.

B. It allows the ability to reduce the number of people being managed in an environment.

C. It allows the ability to hire more people to manage the automation of an environment.

D. It allows the ability to transform security data that can be acted on within an environment.

Answer: A

7.What drives policies and procedures, according to the Security Solutions 1.0 course?

A. industry regulations and order

B. business goals and objectives

C. company security and awareness

D. business growth and efficiency

Answer: B

8.How does a workflow solution work with collaborative applications?

A. It helps monitor system utilization between applications.

B. It streamlines tasks and connects independent business applications.

C. It helps monitor configuration changes between applications.

D. It streamlines tasks and applies configuration changes to each application.

Answer: B

9.A customer is experiencing image-based spam and phishing attacks that are negatively impacting messaging flow. Which Symantec solution should be recommended to this customer?

A. Brightmail Gateway

B. Endpoint Protection

C. Network Access Control

D. Backup Exec System Recovery

Answer: A

10.Which strategy is an appropriate means of defending against social engineering attacks?

A. endpoint security

B. security awareness

C. data loss prevention

D. web security

Answer: B

  如需下载更多的题库,可登陆

阅读(314) | 评论(0) | 转发(0) |
给主人留下些什么吧!~~