单选题 The Computer Security Act of 1987 gave a federal agency responsibility for developing computer security standards and guidelines for federal computer systems. What agency did the act give this responsibility to?
1987年的《计算机安全法》授权联邦机构负责为联邦计算机系统制定计算机安全标准和指南。该法案将这一责任赋予了哪个机构?

A、 National Security Agency国家安全局
B、 Federal Communications Commission联邦通信委员会
C、 Department of Defense国防部
D、 National Institute of Standards and Technology国家标准与技术研究所
下载APP答题
由4l***x2提供 分享 举报 纠错

相关试题

单选题 Under the Digital Millennium Copyright Act(DMCA), what type of offenses do not require prompt action by an internet service provider after it receives a notification of infringement claim from a copyright holder?
根据《数字千年版权法》(DMCA),什么类型的犯罪不需要互联网服务提供商在收到版权持有人的侵权索赔通知后立即采取行动?

A、Storage of information by a customer on a provider’s server客户在提供商的服务器上存储信息
B、Caching of information by the provider提供者对信息的缓存
C、Transmission of information over the provider’s network by a customer客户通过提供商的网络传输信息
D、Caching of information in a provider search engine在提供者搜索引擎中缓存信息

单选题 Match the following numbered wireless attack terms with their appropriate lettered descriptions:
将以下编号的无线攻击术语与其相应的字母描述相匹配:
Wireless attack terms无线攻击形式
1:Rogue access point欺骗访问点
2:Replay重返攻击
3:Evil twin 邪恶双胞胎/双面恶魔
4:War driving 战争驾驶
Descriptions描述
A:An attack that relies on an access point to spoof a legitimate access point’s SSID and Mandatory Access Control(MAC)address依赖访问点欺骗合法访问点的SSID和强制访问控制(MAC)地址的攻击
B:An access point intended to attract new connections by using an apparently legitimate SSID通过使用明显合法的SSID吸引新连接的接入
C:An attack that retransmits captured communication to attempt to gain access to a targeted system重新传输捕获的通信以试图访问目标系统的攻击
D:The process of using detection tools to find wireless networks使用检测工具查找无线网络的过程

A、 1-A;2-B;3-C;4-D;
B、 1-B;2-C;3-A;4-D;
C、 1-C;2-B;3-A;4-D;
D、 1-B;2-D;3-A;4-C;

单选题 What is the final step of a quantitative risk analysis?
定量风险分析的最后一步是什么?

A、Determine asset value. 确定资产价值。
B、Assess the annualized rate of occurrence. 评估年发生率(ARO)。
C、Derive the annualized loss expectancy. 推导出年化预期损失(ALE)。
D、Conduct a cost/benefit analysis. 进行成本/效益分析。

单选题 In 1991, the Federal Sentencing Guidelines formalized a rule that requires senior executives to take personal responsibility for information security matters. What is the name of this rule?
1991年,《联邦判决指南》正式规定了一项规则,要求高级执行官对信息安全事项承担个人责任。这条规则的名称是什么?

A、Due diligence rule尽职调查规则
B、Personal liability rule个人责任规则
C、Prudent man rule谨慎者规则
D、Due process rule正当程序规则

单选题 FlyAway Travel has offices in both the European Union(EU)and the United States and transfers personal information between those offices regularly. They have recently received a request from an EU customer requesting that their account be terminated. Under the General Data Protection Regulation(GDPR), which requirement for processing personal information states that individuals may request that their data no longer be disseminated or processed?
FlyAway Travel在欧盟(EU)和美国都设有办事处,并定期在这些办事处之间传输个人信息。他们最近收到一位欧盟客户的请求,要求终止其账户。根据《一般数据保护条例》(GDPR),处理个人信息的哪项要求规定个人可以要求不再传播或处理其数据?

A、The right to access访问权
B、Privacy by design设计隐私
C、The right to be forgotten被遗忘的权利
D、The right of data portability数据可移植权

单选题 Which one of the following provides an authentication mechanism that would be appropriate for pairing with a password to achieve multifactor authentication?
以下哪项提供了一种认证机制,适合与密码配对以实现多因素认证?

A、Username用户名
B、Personal identification number(PIN)个人识别码(PIN)
C、Security question安全问题
D、Fingerprint scan指纹扫描

单选题 Which one of the following elements of information is not considered personally identifiable information that would trigger most United States(U.S.)state data breach laws?
以下哪项信息要素不被视为会触发大多数美国州数据违反法律的个人可识别信息?

A、Student identification number学生身份证号码
B、Social Security number 社会保险号码
C、Driver’s license number 驾驶执照号码
D、Credit card number 信用卡号码

单选题 Which one of the following is not one of the three common threat modeling techniques?
以下哪项不是三种常见的威胁建模技术之一?

A、Focused on assets关注资产
B、Focused on attackers关注攻击者
C、Focused on software专注于软件
D、Focused on social engineering专注于社会工程