Which of the following security policies is BEST to use when

题目
单选题
Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()
A

The cell phone should require a password after a set period of inactivity.

B

The cell phone should only be used for company related emails.

C

The cell phone data should be encrypted according to NIST standards.

D

The cell phone should have data connection abilities disabled.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which of the following are examples of physical security measures?()

A. Policies and procedures

B. Encryption

C. Locked doors

D. Security personnel

E. Backup tapes


参考答案:C, D

第2题:

A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()

A. WEP encryption

B. Channel rotation

C. Disable SSID

D. WPA encryption


参考答案:D

第3题:

Which of the following is the BEST approach a technician should take when informing a customerabout their findings of any specific computer problem?()

A. Use non-technical terms.

B. Use the appropriate acronyms.

C. Use proper technical terms.

D. Use email to ensure a written record.


参考答案:A

第4题:

Which of the following is the BEST approach a technician should take when informing a customerabout their findings of any specific computer problem?()

  • A、Use non-technical terms.
  • B、Use the appropriate acronyms.
  • C、Use proper technical terms.
  • D、Use email to ensure a written record.

正确答案:A

第5题:

Which one is the most important based on the following common elements of a network design?()

  • A、Business needs
  • B、Risk analysis
  • C、Security policy
  • D、Best practices

正确答案:A

第6题:

A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()

A. WEP

B. Port filtering

C. WPA

D. Longer SSID broadcast intervals


参考答案:C

第7题:

Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()

A. Network layer firewall

B. Stateful inspection firewall

C. Zone aware firewall

D. Application layer firewall


参考答案:D

第8题:

Which of the following is BEST for providing network security?()

A.Firewall

B.DMZ

C.Switch

D.IDS


参考答案:A

第9题:

Which of the following is best practice when disposing of used equipment?()

  • A、Donating to a non-profit group
  • B、Use a local recycling company
  • C、Send equipment back to manufacturer
  • D、Following local laws

正确答案:D

第10题:

Which of the following is BEST for providing network security?()

  • A、Firewall
  • B、DMZ
  • C、Switch
  • D、IDS

正确答案:A

更多相关问题