Which should be the key driver for a company security policy

题目
单选题
Which should be the key driver for a company security policy’s creation, implementation and enforcement?()
A

 the business knowledge of the IT staff

B

 the technical knowledge of the IT staff

C

 the company’s business objectives

D

 the company’s network topology

E

 the IT future directions

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

An administrator is implementing a new data retention program for the company. Which of the following is the MOST important consideration as the new program is created? ()

  • A、 Awareness of company policy requirements
  • B、 Differentiating between archiving and backup processes
  • C、 Awareness of potential legal requirements
  • D、 Ensuring that the backups for the retention program cover key business areas

正确答案:C

第2题:

When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()

  • A、Third-party due diligence policy review
  • B、Remote Access Policy
  • C、Encryption Policy
  • D、Application change control policy
  • E、Security Personnel policy

正确答案:A,B,D

第3题:

Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()

A. Network diagram

B. Performance baseline

C. Network security procedure

D. Company policy


参考答案:A

第4题:

You are the administrator of the Corp arborshoes.com domain. Users in the domain run Windows 2000 Professional on their desktop computers.   A user named Katrin in the Sales organizational unit (OU) reports that her mouse is not working correctly. You log on to the domain from Katrin’s computer by using the domain Administrator account. You use Device Manager to display the current information for the mouse driver.   You discover that Katrin’s computer is using an older version of the mouse driver. You have current drivers furnished by the manufacturer of the mouse. You install the current driver by using Device manager and restart the computer.   You test the mouse and it is still not functioning correctly. You view Device Manger and notice that the display of the current driver indicates that the previous driver is still uninstalled.   You want to be able to install the correct mouse driver. What should you do? ()

  • A、Set the Sales OU policy for security to warn and allow the installation to override the local security defaults. 
  • B、Set the domain policy for security to block but allow the installation to override the local and Sales OU security defaults. 
  • C、Set the Local Computer Policy for security on Katrin’s computer to warn but allow the installation to override the domain and the Sales OU security defaults. 
  • D、Disable plug and play on Katrin’s computer. Restart the computer and manually set up the system resources for the mouse. 

正确答案:A

第5题:

Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()

  • A、Network diagram
  • B、Performance baseline
  • C、Network security procedure
  • D、Company policy

正确答案:A

第6题:

Which should be the key driver for a company security policy’s creation, implementation and enforcement?()

  • A、 the business knowledge of the IT staff
  • B、 the technical knowledge of the IT staff
  • C、 the company’s business objectives
  • D、 the company’s network topology
  • E、 the IT future directions

正确答案:C

第7题:

When disposing of data, which of the following should be considered FIRST?()

  • A、Company policy requirements
  • B、Local legal requirements
  • C、Storage requirements
  • D、Disposal requirements

正确答案:B

第8题:

If there is a conflict in policy for data retention, which of the following should the technician adhere to FIRST?()

  • A、Industry best practices
  • B、Company policy
  • C、International standards
  • D、Local legal requirements

正确答案:D

第9题:

You deploy mobile devices that run Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack. A server that runs Microsoft Exchange Server 2003 Service Pack 2 is configured by using the default installation settings.   Company security policy requires a complex password for unlocking the Windows Mobilebased devices.   You need to ensure that the Windows Mobilebased devices that perform Microsoft ActiveSync synchronization meet the company security policy.   Which two actions should you perform?()

  • A、Enter all mobile device users in the Exceptions list.
  • B、Enable the Require both numbers and letters option.
  • C、Enable the Allow access to devices that do not fully support password settings option.
  • D、Enable the Minimum password length (characters) option. Configure a value of 6 or greater.

正确答案:B,D

第10题:

You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()

  • A、Use Security Templates to correct the setting and export the security file.
  • B、Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.
  • C、Use Secedit /RefreshPolicy Machine_Policy command.
  • D、Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.

正确答案:C

更多相关问题