中文字幕综合一区,伊人av网,欧美中日韩在线,亚洲国产香蕉视频,黄视频在线免费,天天操天天爱天天爽,狠狠躁天天躁

軟題庫 學習課程
試卷年份2021年下半年
試題題型【單選題】
試題內(nèi)容

交換機是構(gòu)成網(wǎng)絡的基礎設備,主要功能是負責網(wǎng)絡通信數(shù)據(jù)包的交換傳輸。交換機根據(jù)功能變化分為五代,其中第二代交換機又稱為以太網(wǎng)交換機,其工作于OSI(開放系統(tǒng)互連參考模型)的 (    ) 。
A.物理層
B.數(shù)據(jù)鏈路層
C.網(wǎng)絡層
D.應用層

查看答案

相關試題

65題: 最小化配置服務是指在滿足業(yè)務的前提下,盡量關閉不需要的服務和網(wǎng)絡端口,以減少系統(tǒng)潛在的安全危害。以下實現(xiàn)Linux系統(tǒng)網(wǎng)絡服務最小化的操作,正確的是(   )。
A.inetd.conf的文件權(quán)限設置為644
B.services的文件權(quán)限設置為600
C.inetd.conf的文件屬主為root
D.關閉與系統(tǒng)業(yè)務運行有關的網(wǎng)絡通信端口
答案解析與討論:www.jazzmuze.com/st/52286269.html

66題: 數(shù)據(jù)庫脫敏是指利用數(shù)據(jù)脫敏技術將數(shù)據(jù)庫中的數(shù)據(jù)進行變換處理,在保持數(shù)據(jù)按需使用目標的同時,又能避免敏感數(shù)據(jù)外泄。以下技術中,不屬于數(shù)據(jù)脫敏技術的是(    )。
A.屏蔽
B.變形
C.替換
D.訪問控制
答案解析與討論:www.jazzmuze.com/st/522872170.html

67題: Oracle數(shù)據(jù)庫提供認證、訪問控制、特權(quán)管理、透明加密等多種安全機制和技術。以下關于Oracle數(shù)據(jù)庫表述,錯誤的是(    )。
A.Oracle數(shù)據(jù)庫的認證方式采用“用戶名+口令”的方式
B.Oracle數(shù)據(jù)庫不支持三方認證
C.Oracle數(shù)據(jù)庫具有口令加密和復雜度驗證等安全功能
D.Oracle數(shù)據(jù)庫提供細粒度訪問控制
答案解析與討論:www.jazzmuze.com/st/5228821589.html

69題: Apache Httpd 是一個用于搭建Web 服務器的開源軟件。Apache Httpd配置文件中,負責基本讀取文件控制的是(    )。
A.httpd.conf
B.srm.conf
C.a(chǎn)ccess.conf
D.mime.conf
答案解析與討論:www.jazzmuze.com/st/522904931.html

70題: 口令是保護路由器安全的有效方法,一旦口令信息泄露就會危及路由器安全。因此,路由器的口令存放應是密文。在路由器配置時,使用(    )命令保存口令密文。
A. Enable secret
B. key chain
C. key-string
D. no ip finger
答案解析與討論:www.jazzmuze.com/st/5229114195.html

71題: Methods for (71)people differ significantly from those for authenticating machines and programs, and this is because of the major differences in the capabilities of people versus computers.Computers are great at doing(72) calculations quickly and correctly, and they have large memories into which they can store and later retrieve Gigabytes of information. Humans don't. So we need to use different methods to authenticate people. In particular, the(73) protocols we've already discussed are not well suited if the principal being uthenticated is a person (with all the associated limitations). All approaches for human authentication rely on at least one of the followings:
Something you know (eg. a password).This is the most common kind of authentication used for humans.We use passwords every day to access our systems. Unfortunately,something that you know can become something you just forgot. And if you write it down, then other people might find it.
Something you(74)(eg.a smart card).This form of human authentication removes the problem of forgetting something you know, but some object now must be with you any time you want to be authenticated. And such an object might be stolen and then becomes something the attacker has.
Something you are (eg. a fingerprint).Base authentication on something ?(75)to the principal being authenticated. It's much harder to lose a fingerprint than a wallet. Unfortunately,biometric sensors are fairly expensive and (at present) not very accurate.
A.a(chǎn)uthenticating
B.a(chǎn)uthentication
C.a(chǎn)uthorizing
D.a(chǎn)uthorization
A.much
B.huge
C.large
D.big
A.network
B.cryptographic
C.communication
D.security
A.a(chǎn)re
B.have
C.can
D.owned
A.unique
B.expenseive
C.important
D.intrinsic
答案解析與討論:www.jazzmuze.com/st/5229210411.html