ADMINISTRACIÓN DE SERVICIOS DE MENSAJERÍA ELECTRÓNICA

Ausgang

Frage 1 of 1

  Übrige Zeit


0 [{"id":313324,"quiz_id":"15513","answer_id":null,"answerType_id":"2","created_at":"2017-10-31 11:50:35","updated_at":"2017-10-31 12:05:06","questionName":"Arrastre y organice las capas en las que se divide la estrategia de la Defensa en Profundidad seg\u00fan la imagen (Tiempo 5 Minutos ya que se lee un poco mal la imagen)","questionTimeSeconds":"0","questionTimeMinutes":"5","questionImagePath":"uploads\/administracion-de-servicios-de-mensajeria-electronica\/DEFENSA EN PROFUINDIDAD.jpg","position":26,"explanation":"La 7 es un regalo pero que se tenga en cuenta \u00a1\u00a1\u00a1\u00a1","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":313284,"quiz_id":"15513","answer_id":null,"answerType_id":"0","created_at":"2017-10-31 08:37:14","updated_at":"2017-10-31 12:05:06","questionName":"Se\u00f1ale las 3 respuestas verdaderas :","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":17,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":309416,"quiz_id":"15513","answer_id":null,"answerType_id":"0","created_at":"2017-10-26 06:57:58","updated_at":"2017-10-31 12:05:06","questionName":"ELIJA LAS 2 RESPUESTAS VERDADERAS","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":15,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":313307,"quiz_id":"15513","answer_id":null,"answerType_id":"0","created_at":"2017-10-31 11:37:55","updated_at":"2017-10-31 12:05:06","questionName":"En securizacion es muy com\u00fan el uso de la estrategia de defensa en profundidad o Defense in Depth. Las capas en las que se divide esta estrategia y la seguridad aplicada son:","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":25,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":313295,"quiz_id":"15513","answer_id":null,"answerType_id":"2","created_at":"2017-10-31 10:07:17","updated_at":"2017-10-31 12:05:06","questionName":"En la imagen se representa el esquema DNS en pasos de ejecuci\u00f3n. Organizelos arrastrando cada uno al orden de las letras :","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":"uploads\/administracion-de-servicios-de-mensajeria-electronica\/DNS.jpg","position":18,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":313283,"quiz_id":"15513","answer_id":null,"answerType_id":"0","created_at":"2017-10-31 08:29:32","updated_at":"2017-10-31 12:05:06","questionName":"Un sistema completo de resoluci\u00f3n de incidencias debe ofrecer. Se\u00f1ale las 3 respuestas verdaderas","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":16,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":313306,"quiz_id":"15513","answer_id":null,"answerType_id":"0","created_at":"2017-10-31 11:31:30","updated_at":"2017-10-31 12:05:06","questionName":"Securizacion, los principios de la seguridad inform\u00e1tica se podr\u00edan resumir en tres pilares b\u00e1sicos :","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":24,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":313297,"quiz_id":"15513","answer_id":null,"answerType_id":"2","created_at":"2017-10-31 10:29:49","updated_at":"2017-10-31 12:05:06","questionName":"Identifique y si es necesario organice en esta imagen las aplicaciones dependiendo de si es Cliente o Servidor :","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":"uploads\/administracion-de-servicios-de-mensajeria-electronica\/mua mta.jpg","position":19,"explanation":"Muy Facilita esta pregunta \u00a1\u00a1\u00a1\u00a1","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":313302,"quiz_id":"15513","answer_id":null,"answerType_id":"0","created_at":"2017-10-31 10:58:30","updated_at":"2017-10-31 12:05:06","questionName":"Identifique a que m\u00e9todo del filtro antispam se refiere esta imagen :","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":"uploads\/administracion-de-servicios-de-mensajeria-electronica\/spf.png","position":21,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":313305,"quiz_id":"15513","answer_id":null,"answerType_id":"2","created_at":"2017-10-31 11:21:05","updated_at":"2017-10-31 12:05:06","questionName":"El m\u00e9todo del filtro antispam a que se refiere esta imagen es DKIM. Ordene si es necesario arrastrando la respuesta seg\u00fan la numeraci\u00f3n del proceso :","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":"uploads\/administracion-de-servicios-de-mensajeria-electronica\/dkim.png","position":23,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":313303,"quiz_id":"15513","answer_id":null,"answerType_id":"0","created_at":"2017-10-31 11:02:59","updated_at":"2017-10-31 12:05:06","questionName":"En la imagen se representa la nueva moneda Catalana. Se\u00f1ale su nombre","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":"uploads\/administracion-de-servicios-de-mensajeria-electronica\/BIZCOIN.jpg","position":22,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":313300,"quiz_id":"15513","answer_id":null,"answerType_id":"0","created_at":"2017-10-31 10:47:05","updated_at":"2017-10-31 12:05:06","questionName":"Cuales son los filtros o metodos antispam","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":20,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":313326,"quiz_id":"15513","answer_id":null,"answerType_id":"0","created_at":"2017-10-31 11:58:53","updated_at":"2017-10-31 12:05:06","questionName":"Balanceo de carga y alta disponibilidad, Exchange, ofrece otras soluciones de cambio y redundancia de conmutaci\u00f3n por error, son 3 se\u00f1alelas :","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":27,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null}]
313324
0
300
block

Arrastre y organice las capas en las que se divide la estrategia de la Defensa en Profundidad según la imagen (Tiempo 5 Minutos ya que se lee un poco mal la imagen)

Den Text abgleichen (klicken und ziehen)   

(0/0)






Passen Sie den Text an

1

2

3

4

5

6

Klicken und Ziehen

SEGURIDAD FISICA

APLICACION

HOST

RED INTERNA

DATOS

PERIMETRO


313284
0
120
none
309416
0
120
none
313307
0
120
none
313295
0
120
none
313283
0
120
none
313306
0
120
none
313297
0
120
none
313302
0
120
none
313305
0
120
none
313303
0
120
none
313300
0
120
none
313326
0
120
none