10.26 Jobs

Source: Internet
Author: User

I. PMI authority (authorization) management infrastructure
1, the access control includes which 2 important process and content;

Contains: 1) certification process, through the "identification" to verify the legal status of the subject

2) authorization process to give users access to a resource through "authorization"

2. What is the difference between PMI and PKI? Which is "What can you Do" and which is "who are you?"

PMI primarily authorizes management to prove what the user has and what they can do, that is, "What can you do?"

PKI is mainly identity identification, identification of users, that is, "who are you?"


Second, information security audit system
1, the People's Republic of China National standards-computer system security capacity of 5 levels;

Level 1th: User-independent protection level

Level 2nd: System Audit Protection level

Level 3rd: Security Mark Protection level

Level 4th: Structured protection level

Level 5th: Access authentication Protection level

2, the concept of network monitoring type, active information acquisition type, system embedded type agent;

1) Network monitoring type: Running on a dedicated listening hardware platform, the hardware is called the network probe

2) System embedded type: Security software installed on each protected host to achieve host-based safety audit and supervision

3) Active Information acquisition: Log collection for some non-host type devices, such as firewalls, switches, routers, etc.


Iii. Organization and management of information security system
1, the Enterprise Information security organization and management, personnel security including which 6;

Including: 1) personnel review; 2) post responsibility and authorization; 3) personnel training; 4) personnel assessment; 5) signing of confidentiality contracts; 6) transfer of personnel

2, the training for information security is divided into four levels, the main content at all levels;

1) Knowledge-level training: establishing sensitivity to the threat and vulnerability of computer information systems, and understanding the basic knowledge of computer information System protection

2) Policy-level training: to provide understanding of computer information System security principles of the ability to enable the executive leadership to make the enterprise computer Information security reasonable, scientific policy

3) Implementation-level training: providing awareness and assessment of the ability of computer information systems to withstand threats and attacks, so that leaders of all levels and security managers responsible for security are able to formulate and implement their corporate security policies

4) Executive level training: Enable staff to apply security concepts when performing tasks related to their functions

3. How many working groups have been established in the Information Security Standard Committee?

1) Information security standards system and Coordination Working Group (WG1); 2) cryptographic algorithms and cryptographic Modules Working Group (GW3); 3) Identification of the Jade Licensing Working Group (GW4); 4) Information Security Assessment Working Group (GW5); 5) information Ah to manage Working Group (GW7)


Iv. Isse-cmms
1. What are the three types of process areas included in ISSE-CMM?

Engineering, project and organization category three


V. New TECHNOLOGIES
1, three models of cloud computing;

PaaS, IaaS, SaaS

2, the three layer of the internet of things;

Perceptual layer, network layer and application layer

3, the difference of incident management, problem management, service level agreement;

Event Management: Occasional occurrence

Problem management: frequently occurring

Service level agreements: requirements for quality of service

4, see "Big Data Development Program", Internet +, China intelligent Manufacturing 2025.


5, the WEB service applies four kinds of circumstances, and does not apply 2 kinds of circumstances;

Where applicable:

(1) Cross-firewall
(2) Application integration
(3) Business-to-business integration
(4) Software reuse
Non-applicable cases:
(1) Stand-alone application
(2) Homogeneous application on the LAN

6, DAS, NAS, san the difference;

1) DAS: Storage System directly connected to the server

2) NAS: storage devices connected to a range of computers through a standard network topology

3) SAN: The use of high-speed fibre Channel as a transmission medium network storage technology, the storage System network, to achieve data sharing and block-level access.

7, the integrated wiring system includes which 6 subsystems.

1) complex subsystem; 2) vertical trunk subsystem; 3) management subsystem; 4) equipment subsystem; 5) horizontal subsystem; 6) Workspace Subsystem

10.26 Jobs

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.