The cell phone should require a password after a set period of inactivity.
The cell phone should only be used for company related emails.
The cell phone data should be encrypted according to NIST standards.
The cell phone should have data connection abilities disabled.
第1题:
A. Policies and procedures
B. Encryption
C. Locked doors
D. Security personnel
E. Backup tapes
第2题:
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
A. WEP encryption
B. Channel rotation
C. Disable SSID
D. WPA encryption
第3题:
A. Use non-technical terms.
B. Use the appropriate acronyms.
C. Use proper technical terms.
D. Use email to ensure a written record.
第4题:
Which of the following is the BEST approach a technician should take when informing a customerabout their findings of any specific computer problem?()
第5题:
Which one is the most important based on the following common elements of a network design?()
第6题:
A. WEP
B. Port filtering
C. WPA
D. Longer SSID broadcast intervals
第7题:
A. Network layer firewall
B. Stateful inspection firewall
C. Zone aware firewall
D. Application layer firewall
第8题:
A.Firewall
B.DMZ
C.Switch
D.IDS
第9题:
Which of the following is best practice when disposing of used equipment?()
第10题:
Which of the following is BEST for providing network security?()