【判断题】
单位各职能部门应当将保密管理要求融入业务工作制度中,并组织落实
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【判断题】
重大涉密工程或者项目应当制定专项保密制度
【判断题】
某公司具有一级保密资格,已根据工作需要制定保密工作基本制度,公司领导认为内设机构没有必要再制定业务制度和专项制度,这样既便于管理,又节省人力、物力
【判断题】
单位主管业务领导、业务部门负有定密工作的主要责任,保密工作机构负有定密工作的组织协调和监督指导的职责。
【判断题】
界定涉密岗位和涉密人员涉密等级的依据是“以项定岗,以岗定人”,即依据任务或者合同项目原始密级和有关保密范围确定岗位及人员的涉密等级
【判断题】
承担机要、档案、密码通信等涉密业务管理的工作人员,不属于专职保密工作人员
【判断题】
国家秘密事项在军工科研生产任务期内不需要继续保密的,应当及时解密
【判断题】
一个人在涉密工作岗位上干得年限越长,知道的国家秘密就越多,因此,应当根据个人在涉密岗位的工作年限确定涉密等级
【判断题】
工作中只要接触绝密级事项的人员,应当被确定为核心涉密人员
【判断题】
工作中经常处理、产生、知悉和掌握绝密级事项的人员,应当被确定为核心涉密人员
【判断题】
单位聘用涉密人员,不必与其签订保密承诺书,只需在聘用合同上明确保密要求就行
【判断题】
单位聘用涉密人员要坚持先审后用的原则,应当进行保密培训并签订保密承诺书
【判断题】
对涉密人员的保密管理不只是对涉密人员上岗前的保密审查和培训,还应包括在岗、离岗保密管理
【判断题】
单位应当每年对涉密人员进行考核,考核不合格的,应当及时调离涉密岗位
【判断题】
涉密人员严重违反保密制度的,应当及时调离涉密岗位
【判断题】
取得三级保密资格的单位,每年对涉密人员进行保密教育培训应当每人不少于 15 学时
【判断题】
取得一级保密资格的单位,每年对涉密人员进行保密教育培训应当每人不少于 15 学时
【判断题】
取得二级保密资格的单位,每年对涉密人员进行保密教育培训应当每人不少于 15 学时
【判断题】
取得三级保密资格的单位,每年对涉密人员进行保密教育培训应当为每人不少于 8 学时
【判断题】
为确保国家秘密安全,取得保密资格单位的涉密人员不允许因私出国(境)
【判断题】
涉密人员因私出国(境),应当按照规定履行审批手续
【判断题】
朱某是某单位的核心涉密人员,2006 年 8 月 20 日从单位退休,按照国家有关规定,2009 年 8 月 20 日之前朱某不能到拟聘用他的外资企业做顾问
【判断题】
孙某是某单位的一般涉密人员,2007 年 3 月 10 日从单位辞职后,2008 年 3 月 10 日之前,他不能到境外机构工作
【判断题】
涉密人员脱离单位,都应当与原单位签订保密承诺书
【判断题】
凡是国家秘密载体,包括已经定稿或者未定稿的文件和电子文档,都应当按照有关规定标明密级和保密期限
【判断题】
制作、收发、传递、使用、复制、保存、维修和销毁国家秘密载体(含纸介质、磁介质和光盘等各类物品)及其过程文件、资料,应当符合国家有关保密管理规定
【判断题】
应当根据工作需要,控制国家秘密载体的接触范围
【判断题】
绝密级国家秘密载体应当存放在密码文件柜中
【判断题】
涉密人员调入其他部门工作,涉密等级和岗位职责发生变化,其使用过的涉密计算机也必须一并带入新部门
【判断题】
涉及国家秘密但未定稿的过程文件,可以不按国家秘密载体管理
【判断题】
某涉密课题组负责人外出开会需携带一份涉密文件,他找单位保密员借出文件并复印登记后携带外出
【判断题】
某涉密人员认为由其使用和管理的移动存储介质中存储大量秘密级信息和一份机密级信息,该介质应当定为秘密级载体
【判断题】
密品在研制、生产、试验、运输、保存、维修、使用过程中应当符合国家有关保密管理规定
【判断题】
涉密人员辞职、解聘、调离涉密岗位,应当在离岗前清退保管和使用的国家秘密载体
【判断题】
一级保密资格单位的保密要害部门应当实行区域隔离,并采取出入口控制、入侵报警、视频监控等技防措施
【判断题】
二级保密资格单位的保密要害部门应当采取物理防护,并采取出入口控制、入侵报警、视频监控等技防措施
【判断题】
涉及保密要害部门、部位的工程建设项目要符合安全保密要求,所采取的保密防护措施应当经过单位保密工作机构审核,与工程项目同计划、同设计、同建设、同验收
【判断题】
携带涉密计算机和移动存储介质外出只要履行审批手续,若带出期间没有使用过,带回后可以不进行保密检查。
【判断题】
涉密信息系统应当配备系统管理员、安全保密管理员、安全审计员,三员角色可以兼任
【判断题】
没有涉密信息系统的单位可以不配备涉密计算机安全保密管理员
推荐试题
【单选题】
A vApp is running out of compute resources when overall activity is high within the resource pool. At other times, everything is fine.What should be done to resolve this issue?___
A. Increase the size of the resource pool Shares.
B. Set the vApp's CPU and Memory Reservation Type to Expandable.
C. Set the vApp's CPU and Memory Limit to Unlimited.
D. Create a new resource pool with the existing hardware configuration.
【单选题】
A virtual machine has been renamed and an administrator is unable to find files with the new virtual machine name in the datastore.What is the reason for this?___
A. The names of the files on the datastore do not change.
B. The names of the files on the datastore have been corrupted.
C. The virtual machine needs to be re-added to the inventory.
D. The Distributed Resource Scheduler moved the virtual machine to another host.
【单选题】
An administrator has configured network connectivity for a new virtual machine, as shown in the Exhibit.What will occur with the network traffic of this virtual machine when communicating externally from vSwitch1?___
A. The virtual machine will communicate on both uplinks
B. The virtual machine will only communicate on vmnic1
C. The virtual machine will only communicate on vmnic2
D. The virtual machine will fail to communicate externally
【单选题】
An administrator is unable to create the first group in a new vRealize Operations environment. What is the likely cause of the problem?___
A. There are no group types defined.
B. The group is not defined in SSO.
C. There are more than 32 group types defined.
D. The description for the group is not provided.
【单选题】
A new vApp was built and tested in the corporate headquarters datacenter running vSphere 6.x. What condition would explain why the virtual machine is failing to boot in an offsite datacenter running on vSphere 5.5?___
A. The virtual machine was built with the default hardware version.
B. The VMFS 5 datastore is not compatible with virtual machines configured with vSphere 6.x.
C. a
D. RS 5.5 cluster cannot run virtual machines configured with vSphere 6.x.
【单选题】
An administrator is evaluating whether to deploy vCenter Server on a Windows server or on a vCenter Server appliance. The administrator has the following requirements: <A web browser will be utilized to manage the vSphere environment.> <16 ESXi hosts will be deployed.> <Licenses must be shared with a vCenter Server at another site.> <An external Oracle 10g database server will be used to host the vCenter Server database.> Why will the administrator need to deploy vCenter Server on a Windows server?___
A. Linked Mode is a requirement for the solution.
B. Oracle 10g is a requirement for the solution.
C. The vSphere web client is a requirement for the solution.
D. Management of more than 5 hosts is a requirement for the solution.
【单选题】
What is a benefit of using VMware Data Protection ?___
A. Provides support for guest-level backups and restores of Microsoft SQL Servers, Exchange Servers, and Share Point Servers.
B. Provides support for advanced storage services including replication, encryption, deduplication, and compression.
C. Provides direct access to VDP configuration integrated into the vSphere Client.
D. Reduces disk space consumed by virtual machine data using deduplication.
【单选题】
An administrator enables vSphere High Availability (HA) on an existing cluster with a large number of hosts and virtual machines. The administrator notices that the setup of vSphere HA on some of the hosts is failing. What step, if taken, might resolve this issue?___
A. Increase the value of the config.vpxd.das.electionWaitTimeSec setting.
B. Set the value of vpxd.das.aamMemoryLimit to 256.
C. Set the value of the das.useDefaultIsolationAddress setting to False.
D. Increase the value of the das.iostatsinterval setting.
【单选题】
An ESXi 6.x host consists of 24 logical cores. Hyperthreading is enabled on the host. What is the maximum number of vCPUs that can be assigned to a virtual machine on this host?___
【单选题】
By default, each ESXi 6.x host is provisioned with a certificate from which root certificate authority?___
A. RedHat Certificate Authority
B. VMware Certificate Authority
C. DigiCert Certificate Authority
D. Verisign Certificate Authority
【单选题】
An administrator is adding an NFS datastore as shown in the Exhibit. What is the purpose of the Servers to be added list?___
A. It contains the IP addresses of the NFS Storage Server to provide multipathing capability.
B. It contains the IP addresses of the ESXi hosts that mount the datastore.
C. It contains the IP addresses used for
D. ynamic Discovery of targets.
【单选题】
An administrator reports that the System Event log data is only available for 24 hours when reviewing the Hardware Status tab. Which condition could be responsible for the loss of data?___
A. A Reset event log was executed.
B. The statistical collection level was set to a value of 1.
C. The boot disk of the host is corrupt.
D. Syslog has been configured at the vCenter Server level.
【单选题】
During an upgrade, the ESXi 6.x installer finds an existing version of ESXi and a VMFS3 volume. No virtual machines exist on the host or VMFS3 volume. The requirement is to upgrade to VMFS5. Which option should be chosen to meet this requirement?___
A. Upgrade ESXi and preserve the VMFS datastore
B. Install ESXi and preserve the VMFS datastore
C. Install ESXi and overwrite the VMFS datastore
D. Upgrade
E. SXi and overwrite the VMFS datastore
【单选题】
A vSphere 6.x Standard Switch is configured with 4 virtual machine portgroups, as shown in the exhibit. Which portgroup would be utilized by default when creating a new virtual machine?___
A. Access Network
B. DMZ Network
C. VM Network
D. Virtual Machine Network
【单选题】
Which vSphere 6.x feature will allow an organization to utilize native snapshots?___
A. Virtual Volumes
B. Virtual SAN
C. VMFS3
D. VMFS5
【单选题】
An administrator is creating a new vSphere Distributed Switch that will be utilized with a specific vSphere Cluster. The cluster itself contains a mix of ESXi 5.x and 6.x Hosts. Which Distributed Switch version should be created to support this configuration?___
A. Distributed Switch: 6.0.0
B. Distributed Switch: 5.0.0
C. Distributed Switch: 5.1.0
D. Distributed Switch: 5.5.0
【单选题】
Which load balancing policy, previously limited to vSphere Distributed Switches, is now available on vSphere Standard Switches with vSphere 6.x?___
A. Route based on physical NIC workload
B. Route based on IP Hash
C. Route based on the originating virtual port
D. Route based on Source MAC Hash
【单选题】
A storage administrator is not seeing full utilization of all bandwidth from an ESXi host. The vSphere administrator observes the adapter details, as shown in the Exhibit. What is the probable cause of this issue?___
A. Another path needs to be used to allow full utilization of the bandwidth.
B. The array is not setup to use the correct multipathing policy.
C. There are no virtual machines on the host.
D. No traffic is being sent across it because a path failed.
【单选题】
A storage administrator is not seeing full utilization of all bandwidth from an ESXi host. The vSphere administrator observes the adapter details, as shown in the Exhibit. What is the probable cause of this issue?___
A. Another path needs to be used to allow full utilization of the bandwidth.
B. The array is not setup to use the correct multipathing policy.
C. There are no virtual machines on the host.
D. No traffic is being sent across it because a path failed.
【单选题】
An administrator has just completed performing an interactive installation of ESXi 6.x and is booting the host. How is the network initially configured?___
A. The network is configured by Automatic Private IP Addressing (APIPA).
B. The network is configured based on the settings detected in DNS.
C. The network is configured with the address as specified in the installer.
D. The network is automatically configured by DHCP.
【单选题】
You have just installed an ESXi 6.x Host. As part of your company security regulations, a security banner must be presented on the console of the host. How can this action be accomplished?___
A. Configure the Advanced Settings > Annotations screen of the ESXi host.
B. This is configured from the Direct Console User Interface configuration menu.
C. It is not possible to configure a security banner for the ESXi host.
D. From vCenter Server, this setting is configured globally in the vCenter Server configuration.
【单选题】
An administrator is only able to see the Health Badge when using the vRealize Operations user interface. What is the likely cause of this behavior?___
A. The vRealize Operations Foundation License is in use.
B. The vmware-sps service failed to start.
C. The vRealize Operations Standard License is in use.
D. The vmware-rbd-watchdog service failed to start.
【单选题】
An administrator has configured an alarm to be notified when a virtual machine meets either of these conditions: <High virtual CPU> <High active memory consumption.> <The alarm is only triggering when both of the conditions are met.> What can be done to correct the alarm behavior?___
A. Edit the alarm and select Trigger if ANY of the following conditions are satisfied.
B. Edit the alarm and select Trigger if ALL of the following conditions are satisfied.
C. Create two separate alarms, one for CPU and one for memory and link them together with ESXCLI.
D. Delete the existing alarm and create a new event based alarm.
【单选题】
An administrator creates an ESXi cluster using vSphere Auto Deploy. The ESXi hosts are configured to get a management IP address from a DHCP server. The administrator needs to troubleshoot the management network on one of the hosts. Which DCUI option should the administrator use to renew the DHCP lease? ___
A. Restart Management Network
B. Restore Network Settings
C. Test Management Network
D. Configure Management Network
【单选题】
An administrator is attempting to restore a number of files in a directory within the Operating System of a virtual machine. How can the administrator restore the files from a previous backup? ___
A. Use the File Level Restore option from the selected backup of the virtual machine in the vSphere Web Client.
B. Connect to the File Level Restore tool from a web browser in the virtual machine.
C. Connect to the File Level Restore tool from the VMware
D. ata Protection appliance.
【单选题】
After selecting an object in vRealize Operations, how can a user compare the badge values of related child objects? ___
A. Use the Scoreboard tab
B. Use the Relationship tab
C. Use the Members tab
D. Use the Overview tab
【单选题】
You want to deploy a vApp and dynamically assign IP addresses without a DHCP server on the network. Which action would you take to accomplish this task? ___
A. Enable IP pools.
B. Configure a local DHCP server in the vApp.
C. Enable NAT on the vApp router.
D. Configure the guest OS for workgroup and WINS.
【单选题】
What is the optimal configuration when building a virtual machine for a single-threaded Windows application? ___
A. Deploy single-threaded applications on uniprocessor virtual machines.
B. Deploy single-threaded applications on symmetric multi-processor virtual machines.
C. Tune single-threaded applications to take advantage of symmetric multi-processor resources.
D. Tune Single-threaded applications at the hypervisor level.
【单选题】
An administrator has created the resource pool configuration shown in the Exhibit. Based on the exhibit, which virtual machine(s) can be successfully powered on? ___
A. VM-M1 only
B. VM-K1 only
C. VM-K1 and VM-K2 only
D. VM-K1, VM-K2, and VM-M1
【单选题】
Which vSphere 6 Enterprise Edition feature will allow an organization to ensure that critical multi-threaded applications have the maximum possible uptime? ___
A. Fault Tolerance
B. High Availability
C. Distributed Resource Scheduler
D. App HA
【单选题】
An administrator has a virtual machine that requires four times the compute resources than other virtual machines on the same ESXi 6.x host. How should the administrator configure the virtual machine settings, in order to be prepared for any resource contention? ___
A. Set the shares of the priority virtual machine to High and the rest to Low.
B. Set the shares of the priority virtual machine to High.
C. Set the shares of the priority virtual machine to High and the rest to Normal.
D. Set the shares of the priority virtual machine to Normal and the rest to Low.
【单选题】
Which type of Adapter does not require vmkernel networking? ___
A. Independent Hardware iSCSI Adapter
B. Dependent Hardware iSCSI Adapter
C. Software iSCSI Adapter
D. Software FCoE Adapter
【单选题】
During the installation of ESXi 6.0, the following error message is reported: Hardware Virtualization is not a feature of the CPU, or is not enabled in the BIOS. Which condition would generate this message? ___
A. LAHF/SAHF is not enabled in the BIOS.
B. NX/XD is not enabled in the BIOS.
C. SSE3 is not enabled in the BIOS.
D. Hyperthreading is not enabled in the BIOS.
【单选题】
An administrator is unable to login to vCenter Server when using the vSphere web client. The administrator successfully accessed vCenter Server using the client earlier the same day. What is the most appropriate first step the administrator should take to resolve this issue? ___
A. Verify the web browser being used has Adobe Flash plugin version 11.5 or later
B. Verify the vCenter Single Sign-On service is running on the vCenter Server
C. Verify the vSphere Web Server service is running on the vCenter Server
D. Verify the administrator has permissions configured in vCenter Server
【单选题】
An administrator has configured an alarm to be notified when a virtual machine meets two conditions: <high virtual CPU> <high active memory consumption> The alarm is malfunctioning and triggering when either condition is met instead of both. What can be done to correct the issue? ___
A. Edit the alarm and select Trigger if ALL of the following conditions are satisfied.
B. Edit the alarm and select Trigger if ANY of the following conditions are satisfied.
C. Create two separate alarms, one for CPU and one for memory.
D. Delete the existing alarm and create a new event based alarm.
【单选题】
What must be enabled to ensure that VM Component Protection (VMCP) works in a High Availability cluster? ___
A. VMware Tools Virtual Machine Communication Interface (VMCI)
B. Fault Tolerance
C. Atomic Test and Set (ATS)
D. All Paths Down (APD) Timeout
【单选题】
An administrator wants to add a web server to an existing multi-tier application consisting of three virtual machines: <A web server> <A database server An application server> The web server should be added to the application when the primary web server reaches: <70% vCPU utilization> <55% active memory> Which option will achieve this result? ___
A. Create a virtual machine alarm with an action to run a script that starts a new instance of the web server.
B. Create a host cpu and memory alarm with an action to run a script that starts a new instance of the webserver.
C. Configure HA application monitoring for the web server and set it to trigger deployment of a new instance of the web server.
D. Configure Fault Tolerance on the virtual machine and leave the secondary machine disabled until needed.
【单选题】
An administrator has an application that requires connection directly to PCI devices through a virtual machine. What is a limitation of this configuration? ___
A. Devices must be reserved for PCI passthrough on at least one host on which the virtual machine will run.
B. Snapshots are not supported with DirectPath I/O passthrough devices.
C. A maximum of 18 PCI vSphere
D. irectPath devices can be added to a virtual machine.
【单选题】
The vSphere administrator is configuring directory services for an ESXi host: What should the vSphere administrator do to configure the host to use CAM services? ___
A. Check the Use vSphere Authentication Proxy checkbox.
B. Set Select Directory Service Type to CAM services.
C. Specify CAM$ for the
D. omain.
【单选题】
Which statement is true regarding the licensing of vCenter Server? ___
A. The license for vCenter Server must be provided at the time of installation.
B. Changing the license assigned to vCenter Server requires a restart of the vCenter Server service.
C. Virtual machines can still be powered on if the vCenter Server license expires.
D. Licensing for a single vCenter Server installation is determined by the number of managed virtual machines.