返回 试卷详情
导航
我的记录

思科认证综合考试题(全英)

250人做过 收藏试卷

试卷预览

1.

Why is the investigation of computer crime involving malicious damage especially challenging?

A. Information stored in a computer is intangible evidence. 
B. Evidence may be destroyed in an attempt to restore the system. 
C. Isolating criminal activity in e detailed audit log is difficult. 
D. Reports resulting from common user error often obscure the actual violation.

2.

Ensuring the integrity of business information is the PRIMARY concern of_____

A. Encryption Security 
B. Procedural Security
C. Logical Security 
D. On-line Security

3.

Which one of the following actions should be taken FIRST after a fire has been detected?

A. Turn off power to the computers 
B. Call the fire department 
C. Notify management 
D. Evacuate all personnel

4.

Which one of the following is the Open Systems Interconnection (OSI) protocol for message handling?

A. X.25 
B. X.400 
C. X.500 
D. X.509

5.

Which of the following is a weakness of both statistical anomaly detection and pattern matching?

A. Lack of ability to scale. 
B. Lack of learning model. 
C. Inability to run in real time. 
D. Requirement to monitor every event.

练习模式 考试模式