每时每刻可信安全1WhichofthefollowingisNOTanadvantagepasswordsyncronizationhasoversinglesign-on?AhighercostBlessintrusiveCimprovedsecurityDlowercostA每时每刻可信安全2WhichofthefollowingbiometricdevicesoffersthelowestCER?AKeystrokedynamicsBVoiceverificationCIrisscanDFingerprintC每时每刻可信安全3Howcananindividualbestbeauthenticated?AUserIdandpasswordBSmartcardandPINcodeCTwo-factorauthenticationDBiometricsD每时每刻可信安全4Passwordscanberequiredtochangemonthly,quarterly,oratotherintervals:AdependingonthecriticalityoftheinformationneedingprotectionBdependingonthecriticalityoftheinformationneedingprotectionandthepassword'sfrequencyofuse.Cdependingonthepassword'sfrequencyofuse.Dnotdependingonthecriticalityoftheinformationneedingprotectionbutdependingonthepassword'sfrequencyofuseB每时每刻可信安全5Themeasuresthatalsoapplytoareasthatareusedforstorageofthebackupdatafilesare:APreventive/physicalBPreventive/administrativeCPreventive/technicalDDetective/administrativeA每时每刻可信安全6Whichauthenticationtechniquebestprotectsagainsthijacking?AStaticauthenticationBContinuousauthenticationCRobustauthenticationDStrongauthenticationB每时每刻可信安全7ThereareparallelsbetweenthetrustmodelsinKerberosandinPKI.Whenwecomparethemsidebyside,Kerberosticketscorrespondmostcloselytowhichofthefollowing?ApublickeysBprivatekeysCpublic-keycertificatesDprivate-keycertificatesC每时每刻可信安全8Whichofthefollowingcanbesteliminatedial-upaccessthroughaRemoteAccessServerasahackingvector?AUsingaTACACS+server.BInstallingtheRemoteAccessServeroutsidethefirewallandforcinglegitimateuserstoauthenticatetothefirewall.CSettingmodemringcounttoatleast5.DOnlyattachingmodemstonon-networkedhostsB每时每刻可信安全9OrganizationsshouldconsiderwhichofthefollowingfirstbeforeconnectingtheirLANstotheInternet?AplanforimplementingworkstationlockingmechanismsBplanforprotectingthemodempoolCplanforprovidingtheuserwithhisaccountusageinformationDplanforconsideringallauthenticationoptionsD每时每刻可信安全10Whichofthefollowingisrequi...