女人久久久www免费人成看片,国内自拍偷拍网,国产一区二区三区免费在线观看,欧美精品三区四区,91久久国产综合久久91,欧美成人精品第一区二区三区 ,美女成人在线观看

軟題庫(kù) 學(xué)習(xí)課程
當(dāng)前位置:信管網(wǎng) >> 在線考試中心 >> 信息安全工程師題庫(kù) >> 試題查看
試卷年份2021年下半年
試題題型【單選題】
試題內(nèi)容

交換機(jī)是構(gòu)成網(wǎng)絡(luò)的基礎(chǔ)設(shè)備,主要功能是負(fù)責(zé)網(wǎng)絡(luò)通信數(shù)據(jù)包的交換傳輸。交換機(jī)根據(jù)功能變化分為五代,其中第二代交換機(jī)又稱(chēng)為以太網(wǎng)交換機(jī),其工作于OSI(開(kāi)放系統(tǒng)互連參考模型)的 (    ) 。
A.物理層
B.?dāng)?shù)據(jù)鏈路層
C.網(wǎng)絡(luò)層
D.應(yīng)用層

查看答案

相關(guān)試題

65題: 最小化配置服務(wù)是指在滿(mǎn)足業(yè)務(wù)的前提下,盡量關(guān)閉不需要的服務(wù)和網(wǎng)絡(luò)端口,以減少系統(tǒng)潛在的安全危害。以下實(shí)現(xiàn)Linux系統(tǒng)網(wǎng)絡(luò)服務(wù)最小化的操作,正確的是(   )。
A.inetd.conf的文件權(quán)限設(shè)置為644
B.services的文件權(quán)限設(shè)置為600
C.inetd.conf的文件屬主為root
D.關(guān)閉與系統(tǒng)業(yè)務(wù)運(yùn)行有關(guān)的網(wǎng)絡(luò)通信端口
答案解析與討論:m.xiexiliangjiufa.com/st/52286269.html

66題: 數(shù)據(jù)庫(kù)脫敏是指利用數(shù)據(jù)脫敏技術(shù)將數(shù)據(jù)庫(kù)中的數(shù)據(jù)進(jìn)行變換處理,在保持?jǐn)?shù)據(jù)按需使用目標(biāo)的同時(shí),又能避免敏感數(shù)據(jù)外泄。以下技術(shù)中,不屬于數(shù)據(jù)脫敏技術(shù)的是(    )。
A.屏蔽
B.變形
C.替換
D.訪問(wèn)控制
答案解析與討論:m.xiexiliangjiufa.com/st/522872170.html

67題: Oracle數(shù)據(jù)庫(kù)提供認(rèn)證、訪問(wèn)控制、特權(quán)管理、透明加密等多種安全機(jī)制和技術(shù)。以下關(guān)于Oracle數(shù)據(jù)庫(kù)表述,錯(cuò)誤的是(    )。
A.Oracle數(shù)據(jù)庫(kù)的認(rèn)證方式采用“用戶(hù)名+口令”的方式
B.Oracle數(shù)據(jù)庫(kù)不支持三方認(rèn)證
C.Oracle數(shù)據(jù)庫(kù)具有口令加密和復(fù)雜度驗(yàn)證等安全功能
D.Oracle數(shù)據(jù)庫(kù)提供細(xì)粒度訪問(wèn)控制
答案解析與討論:m.xiexiliangjiufa.com/st/5228821589.html

69題: Apache Httpd 是一個(gè)用于搭建Web 服務(wù)器的開(kāi)源軟件。Apache Httpd配置文件中,負(fù)責(zé)基本讀取文件控制的是(    )。
A.httpd.conf
B.srm.conf
C.a(chǎn)ccess.conf
D.mime.conf
答案解析與討論:m.xiexiliangjiufa.com/st/522904931.html

70題: 口令是保護(hù)路由器安全的有效方法,一旦口令信息泄露就會(huì)危及路由器安全。因此,路由器的口令存放應(yīng)是密文。在路由器配置時(shí),使用(    )命令保存口令密文。
A. Enable secret
B. key chain
C. key-string
D. no ip finger
答案解析與討論:m.xiexiliangjiufa.com/st/5229114195.html

71題: Methods for (71)people differ significantly from those for authenticating machines and programs, and this is because of the major differences in the capabilities of people versus computers.Computers are great at doing(72) calculations quickly and correctly, and they have large memories into which they can store and later retrieve Gigabytes of information. Humans don't. So we need to use different methods to authenticate people. In particular, the(73) protocols we've already discussed are not well suited if the principal being uthenticated is a person (with all the associated limitations). All approaches for human authentication rely on at least one of the followings:
Something you know (eg. a password).This is the most common kind of authentication used for humans.We use passwords every day to access our systems. Unfortunately,something that you know can become something you just forgot. And if you write it down, then other people might find it.
Something you(74)(eg.a smart card).This form of human authentication removes the problem of forgetting something you know, but some object now must be with you any time you want to be authenticated. And such an object might be stolen and then becomes something the attacker has.
Something you are (eg. a fingerprint).Base authentication on something ?(75)to the principal being authenticated. It's much harder to lose a fingerprint than a wallet. Unfortunately,biometric sensors are fairly expensive and (at present) not very accurate.
A.a(chǎn)uthenticating
B.a(chǎn)uthentication
C.a(chǎn)uthorizing
D.a(chǎn)uthorization
A.much
B.huge
C.large
D.big
A.network
B.cryptographic
C.communication
D.security
A.a(chǎn)re
B.have
C.can
D.owned
A.unique
B.expenseive
C.important
D.intrinsic
答案解析與討論:m.xiexiliangjiufa.com/st/5229210411.html