the business knowledge of the IT staff
the technical knowledge of the IT staff
the company’s business objectives
the company’s network topology
the IT future directions
第1题:
An administrator is implementing a new data retention program for the company. Which of the following is the MOST important consideration as the new program is created? ()
第2题:
When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()
第3题:
A. Network diagram
B. Performance baseline
C. Network security procedure
D. Company policy
第4题:
You are the administrator of the Corp arborshoes.com domain. Users in the domain run Windows 2000 Professional on their desktop computers. A user named Katrin in the Sales organizational unit (OU) reports that her mouse is not working correctly. You log on to the domain from Katrin’s computer by using the domain Administrator account. You use Device Manager to display the current information for the mouse driver. You discover that Katrin’s computer is using an older version of the mouse driver. You have current drivers furnished by the manufacturer of the mouse. You install the current driver by using Device manager and restart the computer. You test the mouse and it is still not functioning correctly. You view Device Manger and notice that the display of the current driver indicates that the previous driver is still uninstalled. You want to be able to install the correct mouse driver. What should you do? ()
第5题:
Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()
第6题:
Which should be the key driver for a company security policy’s creation, implementation and enforcement?()
第7题:
When disposing of data, which of the following should be considered FIRST?()
第8题:
If there is a conflict in policy for data retention, which of the following should the technician adhere to FIRST?()
第9题:
You deploy mobile devices that run Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack. A server that runs Microsoft Exchange Server 2003 Service Pack 2 is configured by using the default installation settings. Company security policy requires a complex password for unlocking the Windows Mobilebased devices. You need to ensure that the Windows Mobilebased devices that perform Microsoft ActiveSync synchronization meet the company security policy. Which two actions should you perform?()
第10题:
You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()