单选题Which of the following ensures the MOST secure access to a server room?()A  ID card readersB  Server rack doorsC  Biometric devicesD  Locked doors

题目
单选题
Which of the following ensures the MOST secure access to a server room?()
A

 ID card readers

B

 Server rack doors

C

 Biometric devices

D

 Locked doors

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

When adding another server to an existing rack mount system, which of the following should the administrator consider FIRST?()

A. Load on UPS

B. Rack temperature

C. Room temperature

D. Ease of access


参考答案:B

第2题:

Which of the following is a way to protect server operating systems from a short term contractor?()

  • A、Biometric devices
  • B、Limited logon hours
  • C、Mantraps
  • D、Rack doors

正确答案:B

第3题:

Which of the following is a way to protect server operating systems from a short term contractor?()

A. Biometric devices

B. Limited logon hours

C. Mantraps

D. Rack doors


参考答案:B

第4题:

Which of the following is the MOST important factor when considering environmental factors?()

  • A、Server room access should be limited to authorized personnel.
  • B、Servers should be kept in a warm and dark environment.
  • C、Remove the floppy drives from the system.
  • D、The server administrator should ensure adequate levels of cooling.

正确答案:D

第5题:

While reviewing the backup logs a server administrator notices that a backup job for an application server on the same subnet has failed. Which of the following is MOST likely the problem?()

  • A、The remote agent was not running.
  • B、The management card has failed.
  • C、The proxy server was blocking access.
  • D、The hardware firewall was blocking access.

正确答案:A

第6题:

After creating backups of critical system and user data, which of the following is the BEST location to store the backups?()

  • A、In the supply closet so anyone can access them if needed
  • B、Near the server for easy access to restore files
  • C、Locked in a cabinet in the IT Manager’s office
  • D、At a secure off-site storage facility

正确答案:D

第7题:

Which of the following should be included in the network diagram?()

  • A、Server room access log
  • B、Server types
  • C、OEM contact information
  • D、Temperature reading

正确答案:B

第8题:

Which of the following are types of biometric devices used in server rooms?()

A. Mantraps

B. Fingerprint scanners

C. CCTV systems

D. Retina scanner

E. Proxy card readers


参考答案:B, D

第9题:

Which of the following is MOST likely to occur if the temperature in the server room is cooled too quickly after a power outage?()

  • A、Server forms condensation
  • B、Server will not POST
  • C、Server’s services will not start
  • D、Server response times are slow due to temperature change

正确答案:A

第10题:

Which of the following is the MOST secure method to authenticate users?()

  • A、User ID, a strong password, and a fingerprint scanner
  • B、User ID, a strong password, and a token based device
  • C、User ID and two levels of strong password requirements
  • D、User ID, a strong password, and a smart card

正确答案:A

更多相关问题