免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 1505 | 回复: 0
打印 上一主题 下一主题

ST0-095考題下載 [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2010-12-28 18:26 |只看该作者 |倒序浏览
<p align="left"><p align="left">最新ST0-095考題分享</p></p><p align="left"><p align="left">1.Which statement reflects a risk-based security program?</p></p><p align="left"><p align="left">A. We are in the process of identifying the effectiveness of the security in our PCI environment.</p></p><p align="left"><p align="left">B. We are in the process of identifying the business impact related to our PCI environment.</p></p><p align="left"><p align="left">C. We are in the process of identifying the appropriate controls related to our PCI environment.</p></p><p align="left"><p align="left">D. We are in the process of identifying the systems impacted by PCI regulations.</p></p><p align="left"><p align="left">Answer: B</p></p><p align="left"><p align="left">2.How can a security professional within an organization become viewed as a business partner to an executive?</p></p><p align="left"><p align="left">A. by speaking to security roles and processes</p></p><p align="left"><p align="left">B. by articulating risk in terms of financial value</p></p><p align="left"><p align="left">C. by speaking to the fundamentals of security</p></p><p align="left"><p align="left">D. by ensuring that compliance is the top priority</p></p><p align="left"><p align="left">Answer: B</p></p><p align="left"><p align="left">3.What drives consultative conversations and establishes credibility with an organization?</p></p><p align="left"><p align="left">A. establishing a security policy</p></p><p align="left"><p align="left">B. providing industry insight</p></p><p align="left"><p align="left">C. providing regulatory information</p></p><p align="left"><p align="left">D. establishing technical controls</p></p><p align="left"><p align="left">Answer: B</p></p><p align="left"><p align="left">4.What is one of the common security concerns among organizations today, according to the Global State of Information Security survey 2010?</p></p><p align="left"><p align="left">A. quality of service</p></p><p align="left"><p align="left">B. PCI compliance</p></p><p align="left"><p align="left">C. data protection</p></p><p align="left"><p align="left">D. asset management</p></p><p align="left"><p align="left">Answer: C</p></p><p align="left"><p align="left">5.Which two process types form the basis for the development of a workflow solution? (Select two.)</p></p><p align="left"><p align="left">A. production processes</p></p><p align="left"><p align="left">B.security processes</p></p><p align="left"><p align="left">C.business processes</p></p><p align="left"><p align="left">D.monitoring processes</p></p><p align="left"><p align="left">E.automation processes</p></p><p align="left"><p align="left">Answer: C, E</p></p><p align="left"><p align="left">6.What is the benefit that a workflow solution provides for the security of an environment?</p></p><p align="left"><p align="left">A. It allows the ability to react to security events in a timely and automated fashion.</p></p><p align="left"><p align="left">B. It allows the ability to reduce the number of people being managed in an environment.</p></p><p align="left"><p align="left">C. It allows the ability to hire more people to manage the automation of an environment.</p></p><p align="left"><p align="left">D. It allows the ability to transform security data that can be acted on within an environment.</p></p><p align="left"><p align="left">Answer: A</p></p><p align="left"><p align="left">7.What drives policies and procedures, according to the Security Solutions 1.0 course?</p></p><p align="left"><p align="left">A. industry regulations and order</p></p><p align="left"><p align="left">B. business goals and objectives</p></p><p align="left"><p align="left">C. company security and awareness</p></p><p align="left"><p align="left">D. business growth and efficiency</p></p><p align="left"><p align="left">Answer: B</p></p><p align="left"><p align="left">8.How does a workflow solution work with collaborative applications?</p></p><p align="left"><p align="left">A. It helps monitor system utilization between applications.</p></p><p align="left"><p align="left">B. It streamlines tasks and connects independent business applications.</p></p><p align="left"><p align="left">C. It helps monitor configuration changes between applications.</p></p><p align="left"><p align="left">D. It streamlines tasks and applies configuration changes to each application.</p></p><p align="left"><p align="left">Answer: B</p></p><p align="left"><p align="left">9.A customer is experiencing image-based spam and phishing attacks that are negatively impacting messaging flow. Which Symantec solution should be recommended to this customer?</p></p><p align="left"><p align="left">A.Brightmail Gateway</p></p><p align="left"><p align="left">B.Endpoint Protection</p></p><p align="left"><p align="left">C.Network Access Control</p></p><p align="left"><p align="left">D.Backup Exec System Recovery</p></p><p align="left"><p align="left">Answer: A</p></p><p align="left"><p align="left">10.Which strategy is an appropriate means of defending against social engineering attacks?</p></p><p align="left"><p align="left">A. endpoint security</p></p><p align="left"><p align="left">B. security awareness</p></p><p align="left"><p align="left">C. data loss prevention</p></p><p align="left"><p align="left">D. web security</p></p><p align="left"><p align="left">Answer: B</p></p>
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP