第
54題: RAID技術(shù)中,磁盤容量利用率最低的是()。
A、RAID0
B、RAID1
C、RAID5
D、RAID6
答案解析與討論:
m.xiexiliangjiufa.com/st/4182811175.html第
55題: 三層網(wǎng)絡(luò)設(shè)計方案中,()是匯聚層的功能。
A、不同區(qū)域的高速數(shù)據(jù)轉(zhuǎn)發(fā)
B、用戶認(rèn)證、計費管理
C、終端用戶接入網(wǎng)絡(luò)
D、實現(xiàn)網(wǎng)絡(luò)的訪問策略控制
答案解析與討論:
m.xiexiliangjiufa.com/st/4182926020.html第
56題: 以下關(guān)于網(wǎng)絡(luò)工程需求分析的敘述中,錯誤的是()。
A、任何網(wǎng)絡(luò)都不可能是一個能夠滿足各項功能需求的萬能網(wǎng)
B、需求分析要充分考慮用戶的業(yè)務(wù)需求
C、需求的定義越明確和詳細(xì),網(wǎng)絡(luò)建成后用戶的滿意度越高
D、網(wǎng)絡(luò)需求分析時可以先不考慮成本因素
答案解析與討論:
m.xiexiliangjiufa.com/st/418307401.html第
58題: Network security consists of policies and practices to prevent and monitor (1) access,misuse, modification, or denial of a computer network and network-accessible resources.Network security involves the authorization of access to data in a network, which is controlled by the network(2).Users choose or are assigned an ID and password or other authenticating information that allows them to access to information and programs within their authority.Network security secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a (3) name and a corresponding password. Network security starts with authentication. Once authenticated,a(4)enforces access policies such as what services are allowed to be accessed by the network users.Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer(5)or Trojans being transmitted over the network.
(1) A、unauthorized
B、harmful
C、dangerous
D、frequent
(2) A、user
B、agent
C、server
D、administrator
(3) A、complex
B、unique
C、catchy
D、long
(4) A、firewall
B、proxy
C、gateway
D、host
(5) A、spams
B、malwares
C、worms
D、programs
答案解析與討論:
m.xiexiliangjiufa.com/st/4183220320.html