软考初级

● Most (75) measures involve data encryption and password.(75)A. securityB. hardwareC. displayD. program

题目

● Most (75) measures involve data encryption and password.

(75)

A. security

B. hardware

C. display

D. program

参考答案和解析
正确答案:A

如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

● NAC’s (Network Access Control ) role is to restrict network access to only compliant endpoints and (66) users. However, NAC is not a complete LAN (67) solution; additional proactive and (68) security measures must be implemented. Nevis is the first and only comprehensive LAN security solution that combines deep security processing of every packet at 10Gbps, ensuring a high level of security plus application availability and performance. Nevis integrates NAC as the first line of LAN security (69) . In addition to NAC, enterprises need to implement role-based network access control as well as critical proactive security measures — real-time, multilevel (70inspection and microsecond threat containment.

(66)A. automated B. distinguished C. authenticated D. destructed

(67)A. crisis B. security C. favorable D. excellent

(68)A. constructive B. reductive C. reactive D. productive

(69)A. defense B. intrusion C. inbreak D. protection

(70)A. port B. connection C. threat D. insurance


正确答案:C,B,C,A,D

 




第2题:

● Computer(75) is a complex consisting of two or more connected computing units, it is used for the purpose of data communication and resource sharing.

(75)A. storage B. device C. network D. processor


正确答案:C

第3题:

● Software (75) focuses on three attributes of the program: software architecture, data structure, and procedural detail.

(75)

A. analysis

B. design

C. installation

D. upgrade


正确答案:B

第4题:

You are hosting a Windows Communication Foundation (WCF) service at http://www.contoso.com for a law enforcement agency.The agency adds operations to support sending biometric fingerprint data via non-buffered streaming.The service data is routed between intermediaries. The WCF binding you are using by default does not support encryption.You need to ensure that the fingerprint data is not disclosed when passed over the network. What should you do?()

A. Use basicHttpBinding with message security to https://www.contoso.com

B. Use basicHttpBinding with transport security to https://www.contoso.com

C. Use wsHttpBinding with message security to https://www.contoso.com

D. Use wsHttpBinding with transport security to http://www.contoso.com


参考答案:B

第5题:

● An embedded operating system is the(71) program that manages all the other programs in an embedded device after initial load of programs by a(an) (72). It normally guarantees a certain capability within a specified(73) size and (74) constraint as well as with application programs. It also normally has small foot print including initial boot loader, OS kernel, required device drivers, (75) for the user data and so forth. It has very-likely structure of a normal operating system however mainly differentiated by some factors such as type of pre-installed device, functional limits, taking designed job only.

(71)A. hardware B. business C. software D. external

(72)A. driver B. application C. kernel D. boot loader

(73)A. data B. storage C. bus D. CPU

(74)A. time B. format C. controller D. packet

(75)A. JAFFS B. format C. file systems D. protocol


正确答案:C,D,B,A,C

第6题:

● Virtualization is an approach to IT that pools and shares (71) so that utilization is optimized and supplies automatically meet demand. Traditional IT environments are often silos, where both technology and human (72) are aligned around an application or business function. With a virtualized (73) , people, processes, and technology are focused on meeting service levels, (74 ) is allocated dynamically, resources are optimized, and the entire infrastructure is simplified and flexible. We offer a broad spectrum of virtualization (75) that allows customers to choose the most appropriate path and optimization focus for their IT infrastructure resources.

(71)A. advantages B. resources C. benefits D. precedents

(72)A. profits B. costs C. resources D. powers

(73)A. system B. infrastructure C. hardware D. link

(74)A. content B. position C. power D. capacity

(75)A. solutions B. networks C. interfaces D. connections


正确答案:B,C,B,D,A


第7题:

Most(75)measures involve data encryption and password.

A.security

B.hardware

C.display

D.program


正确答案:A
解析:安全措施大多包括数据加密与口令。

第8题:

● Many of the activities performed during the preliminary investigation are still being conducted in (71) , but in much greater depth than before. During this phase, the analyst must become fully aware of the (72) and must develop enough knowledge about the (73) and the existing systems to enable an effective solution to be proposed and implemented. Besides the (74) for process and data of current system, the deliverable from this phase also includes the (75) for the proposed system.

(71)

A. analysis phase

B. design phase

C. implementation phase

D. maintenance phase

(72)

A. main symptom

B. root problem

C. final blueprint

D. data specification

(73)

A. hardware environment

B. testing environment

C. software environment

D. business environment

(74)

A. logical models

B. physical models

C. design models

D. implementation models

(75)

A. hardware and software specification

B. system performance specification

C. formal requirements definition

D. general problem statement


正确答案:A,B,D,A,C

第9题:

● A (75) infected computer may lose its data.

(75)

A. file

B. data base

C. virus

D. program


正确答案:C

第10题:

Members of Internet-based supply chains will need to evaluate their () and employ () and other electronic security tools to protect confidential data.

A.security needs

B.patent

C.firework

D.encryption technologies


正确答案:AD

更多相关问题