单选题Which benefit does digital subscriber line (DSL) systems for broadband access provide to the user?()A Dedicated lines for high security data transferB Data and audio signals that share the same communications infrastructureC Secure access to company ex

题目
单选题
Which benefit does digital subscriber line (DSL) systems for broadband access provide to the user?()
A

Dedicated lines for high security data transfer

B

Data and audio signals that share the same communications infrastructure

C

Secure access to company extranet

D

Simple solution for high-quality digital video using coaxial cable

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization (授权).
An access control mechanism (71) between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is (72) to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(73)access. An auditing function monitors and keeps a record of user accesses to system resources.
In practice, a number of(74)may cooperatively share the access control function. All operating systems have at least a rudimentary(基本的), and in many cases a quite robust, access control component. Add-on security packages can add to the(75)access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services.

A.open
B.monitor
C.grant
D.seek

答案:C
解析:
在物理安全和信息安全领域,访问控制是对一个地方或其他资源的访问限制。访问的行为可能意味着消费、输入或使用。允许访问资源被称为授权。
访问控制机制连接用户(代表用户执行的进程)和系统资源(如应用程序、操作系统、防火墙、路由器、文件和数据库)之间的连接。系统必须首先对用户进行身份验证。通常,身份验证功能决定用户是否被允许访问系统。然后,访问控制功能决定是否允许该用户指定的访问权限。安全管理员维护一个授权数据库,该数据库指定允许该用户访问哪些资源的类型。访问控制函数咨询此数据库以确定是否授予访问权。审计功能监视并保存用户访问系统资源的记录。
在实践中,一些用户可以合作共享访问控制函数。所有操作系统都至少有一个基本的,而且在许多情况下是一个相当健壮的访问控制组件。附加安全包可以添加到操作系统的自动访问控制功能。特定的应用程序或实用程序,如数据库管理系统,也包括访问控制功能。外部设备,如防火墙,也可以提供访问控制服务。

第2题:

Which benefit does digital subscriber line (DSL) systems for broadband access provide to the user?()

  • A、Dedicated lines for high security data transfer
  • B、Data and audio signals that share the same communications infrastructure
  • C、Secure access to company extranet
  • D、Simple solution for high-quality digital video using coaxial cable

正确答案:B

第3题:

ABC Corp. is implementing 11i Oracle Applications. The company has two local administrators in separate locations. They need to ensure that only a relevant set of users is visible to each of these local administrators.Which action will meet the requirement?()

A.create a separate role for each local administrator

B.specify user administration privileges in Oracle User Management

C.use Data Security to provide relevant access to each local administrator

D.use Function Security to provide relevant access to each local administrator


参考答案:B

第4题:

Which of the following connection types use a phone line as a carrier to provide access to theInternet?()

  • A、Cellular
  • B、Satellite
  • C、ISDN
  • D、WiMAX
  • E、DSL

正确答案:C,E

第5题:

A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()

  • A、WEP encryption
  • B、Channel rotation
  • C、Disable SSID
  • D、WPA encryption

正确答案:D

第6题:

After creating backups of critical system and user data, which of the following is the BEST location to store the backups?()

  • A、In the supply closet so anyone can access them if needed
  • B、Near the server for easy access to restore files
  • C、Locked in a cabinet in the IT Manager’s office
  • D、At a secure off-site storage facility

正确答案:D

第7题:

Select a key benefit of DSL.()

  • A、TCP packet sizes can be optimized by the router so there is no IPSec or AAL5 padding.
  • B、The local loop is a dedicated connection for a single subscriber to the DSLAM. 
  • C、Access to the WAN media uses a poll/response mechanism so no two subscribers transmit at the same time. 
  • D、There are no distance requirements from the Central Office (CO). 

正确答案:B

第8题:

Which of the following connection types use a phone line as a carrier to provide access to theInternet?()

A.Cellular

B.Satellite

C.ISDN

D.WiMAX

E.DSL


参考答案:C, E

第9题:

A financial company is auditing to ensure their systems are safe from external attack.They have just purchased new Power 750 servers. Which features of AIX 6.1 will help in the auditing process?()

  • A、IPSec and Kerberos Authentication
  • B、Secure By Default and AIX Security Expert
  • C、Trusted Execution and Role Based Access Control
  • D、First Failure Data Capture and Storage Protection Keys

正确答案:B

第10题:

Which three can be symptoms of the growth phase in the Cisco SBR methodology?()

  • A、Facilitate Employee Reachability
  • B、Unable to provide rapid secure access to customer history, data or buying behavior
  • C、Need to provide XYZ LTD with a basic up-to-date website
  • D、Provide rapid access for geographically dispersed employees
  • E、Need to facilitate customer reachability
  • F、Provide a Website on par with competitors

正确答案:A,D,F

更多相关问题