功能测试

最新最全的ST0-095题库免费下载!(killtest题库网提供)

发布-admin | 查看- | 发表时间-2010-12-27

ST0-095题库考试题库由我们专业IT认证讲师及产品专家精心打造,包括了当前最新的全真考试试题,全部附有正确答案。题库的覆盖率在96%以上,在考试认证厂商对考题做出变化时,网站都将在第一时间内更新,最终确保考生能一次通过!

  以下是ST0-095题库的部分题目: 

1.Which statement reflects a risk-based security program?

A. We are in the process of identifying the effectiveness of the security in our PCI environment.

B. We are in the process of identifying the business impact related to our PCI environment.

C. We are in the process of identifying the appropriate controls related to our PCI environment.

D. We are in the process of identifying the systems impacted by PCI regulations.

Answer: B

2.How can a security professional within an organization become viewed as a business partner to an executive?

A. by speaking to security roles and processes

B. by articulating risk in terms of financial value

C. by speaking to the fundamentals of security

D. by ensuring that compliance is the top priority

Answer: B

3.What drives consultative conversations and establishes credibility with an organization?

A. establishing a security policy

B. providing industry insight

C. providing regulatory information

D. establishing technical controls

Answer: B

4.What is one of the common security concerns among organizations today, according to the Global State of Information Security survey 2010?

A. quality of service

B. PCI compliance

C. data protection

D. asset management

Answer: C

5.Which two process types form the basis for the development of a workflow solution? (Select two.)

A. production processes

B.security processes

C.business processes

D.monitoring processes

E.automation processes

Answer: C, E

6.What is the benefit that a workflow solution provides for the security of an environment?

A. It allows the ability to react to security events in a timely and automated fashion.

B. It allows the ability to reduce the number of people being managed in an environment.

C. It allows the ability to hire more people to manage the automation of an environment.

D. It allows the ability to transform security data that can be acted on within an environment.

Answer: A

7.What drives policies and procedures, according to the Security Solutions 1.0 course?

A. industry regulations and order

B. business goals and objectives

C. company security and awareness

D. business growth and efficiency

Answer: B

8.How does a workflow solution work with collaborative applications?

A. It helps monitor system utilization between applications.

B. It streamlines tasks and connects independent business applications.

C. It helps monitor configuration changes between applications.

D. It streamlines tasks and applies configuration changes to each application.

Answer: B

9.A customer is experiencing image-based spam and phishing attacks that are negatively impacting messaging flow. Which Symantec solution should be recommended to this customer?

A. Brightmail Gateway

B. Endpoint Protection

C. Network Access Control

D. Backup Exec System Recovery

Answer: A

10.Which strategy is an appropriate means of defending against social engineering attacks?

A. endpoint security

B. security awareness

C. data loss prevention

D. web security

Answer: B

  如需下载更多的题库,可登陆killtest题库网

 

◎欢迎参与讨论,请在这里发表您的看法、交流您的观点。

最新文章
最近评论
Copyright 2010 killtest.com.cn Some Rights Reserved. 浙ICP备10016241号 | DESIGN BY Seanloo.cn