单项选择题
Which of the following is the MOST secure method to authenticate users?()
A. User ID, a strong password, and a fingerprint scanner
B. User ID, a strong password, and a token based device
C. User ID and two levels of strong password requirements
D. User ID, a strong password, and a smart card
相关考题
-
单项选择题
A frustrated customer has called about their computer that is not functioning correctly. Which of the following is the BEST question to ask the user?()
A. “Can you avoid using the PC that crashed?”
B. “What was the last thing that occurred before the PC had problems?”
C. “What were you doing before the PC went down?”
D. “What was the last thing you did before the PC crashed?” -
单项选择题
A customer reports the optical drive is no longer responding. Which of the following questionsshould be asked FIRST?()
A. “Did you log in with an administrator account?”
B. “Have you been to any inappropriate websites?”
C. “What have you changed since the optical drive worked properly?”
D. “What has changed since the optical drive worked properly?” -
单项选择题
A person calls in asking for the name of the vendor that the technician uses for the organizations firewall hardware. Which of the following is the BEST action for the technician to take?()
A. Immediately forward the call to the vendor.
B. Give the information to the caller.
C. Hang up on the caller immediately and report the call to upper management.
D. Politely refuse to give the information and end the call.
