- 论坛徽章:
- 0
|
<p align="left"><p align="left">最新ST0-095考題分享</p></p><p align="left"><p align="left">1.Which statement reflects a risk-based security program?</p></p><p align="left"><p align="left">A. We are in the process of identifying the effectiveness of the security in our PCI environment.</p></p><p align="left"><p align="left">B. We are in the process of identifying the business impact related to our PCI environment.</p></p><p align="left"><p align="left">C. We are in the process of identifying the appropriate controls related to our PCI environment.</p></p><p align="left"><p align="left">D. We are in the process of identifying the systems impacted by PCI regulations.</p></p><p align="left"><p align="left">Answer: B</p></p><p align="left"><p align="left">2.How can a security professional within an organization become viewed as a business partner to an executive?</p></p><p align="left"><p align="left">A. by speaking to security roles and processes</p></p><p align="left"><p align="left">B. by articulating risk in terms of financial value</p></p><p align="left"><p align="left">C. by speaking to the fundamentals of security</p></p><p align="left"><p align="left">D. by ensuring that compliance is the top priority</p></p><p align="left"><p align="left">Answer: B</p></p><p align="left"><p align="left">3.What drives consultative conversations and establishes credibility with an organization?</p></p><p align="left"><p align="left">A. establishing a security policy</p></p><p align="left"><p align="left">B. providing industry insight</p></p><p align="left"><p align="left">C. providing regulatory information</p></p><p align="left"><p align="left">D. establishing technical controls</p></p><p align="left"><p align="left">Answer: B</p></p><p align="left"><p align="left">4.What is one of the common security concerns among organizations today, according to the Global State of Information Security survey 2010?</p></p><p align="left"><p align="left">A. quality of service</p></p><p align="left"><p align="left">B. PCI compliance</p></p><p align="left"><p align="left">C. data protection</p></p><p align="left"><p align="left">D. asset management</p></p><p align="left"><p align="left">Answer: C</p></p><p align="left"><p align="left">5.Which two process types form the basis for the development of a workflow solution? (Select two.)</p></p><p align="left"><p align="left">A. production processes</p></p><p align="left"><p align="left">B.security processes</p></p><p align="left"><p align="left">C.business processes</p></p><p align="left"><p align="left">D.monitoring processes</p></p><p align="left"><p align="left">E.automation processes</p></p><p align="left"><p align="left">Answer: C, E</p></p><p align="left"><p align="left">6.What is the benefit that a workflow solution provides for the security of an environment?</p></p><p align="left"><p align="left">A. It allows the ability to react to security events in a timely and automated fashion.</p></p><p align="left"><p align="left">B. It allows the ability to reduce the number of people being managed in an environment.</p></p><p align="left"><p align="left">C. It allows the ability to hire more people to manage the automation of an environment.</p></p><p align="left"><p align="left">D. It allows the ability to transform security data that can be acted on within an environment.</p></p><p align="left"><p align="left">Answer: A</p></p><p align="left"><p align="left">7.What drives policies and procedures, according to the Security Solutions 1.0 course?</p></p><p align="left"><p align="left">A. industry regulations and order</p></p><p align="left"><p align="left">B. business goals and objectives</p></p><p align="left"><p align="left">C. company security and awareness</p></p><p align="left"><p align="left">D. business growth and efficiency</p></p><p align="left"><p align="left">Answer: B</p></p><p align="left"><p align="left">8.How does a workflow solution work with collaborative applications?</p></p><p align="left"><p align="left">A. It helps monitor system utilization between applications.</p></p><p align="left"><p align="left">B. It streamlines tasks and connects independent business applications.</p></p><p align="left"><p align="left">C. It helps monitor configuration changes between applications.</p></p><p align="left"><p align="left">D. It streamlines tasks and applies configuration changes to each application.</p></p><p align="left"><p align="left">Answer: B</p></p><p align="left"><p align="left">9.A customer is experiencing image-based spam and phishing attacks that are negatively impacting messaging flow. Which Symantec solution should be recommended to this customer?</p></p><p align="left"><p align="left">A.Brightmail Gateway</p></p><p align="left"><p align="left">B.Endpoint Protection</p></p><p align="left"><p align="left">C.Network Access Control</p></p><p align="left"><p align="left">D.Backup Exec System Recovery</p></p><p align="left"><p align="left">Answer: A</p></p><p align="left"><p align="left">10.Which strategy is an appropriate means of defending against social engineering attacks?</p></p><p align="left"><p align="left">A. endpoint security</p></p><p align="left"><p align="left">B. security awareness</p></p><p align="left"><p align="left">C. data loss prevention</p></p><p align="left"><p align="left">D. web security</p></p><p align="left"><p align="left">Answer: B</p></p> |
|