第1题:
The objective of ( )is to determine what parts of the application software will be assigned to what hardware.The major software components of the system being developed have to be identified and then allocated to the various hardware components on which the system will operate. All software systems can be divided into four basic functions. The first is( ). Most information systems require data to be stored and retrieved,whether a small file,such as a memo produced by a word processor,or a large database,such as one that stores an organization’s accounting records. The second function is the ( ),the processing required to access data,which often means database queries in Structured Query Language. The third function is the ( ),which is the logic documented in the DFDs,use cases,and functional requirements.The fourth function is the presentation logic,the display of information to the user and the acceptance of the user’s commands.The three primary hardware components of a system are ( ).
A.architecture design B.modular design C.physical design D.distribution design A.data access components B.database management system C.data storage D.data entities A.data persistence B.data access objects C.database connection D.dataaccess logic A.system requirements B.system architecture C.application logic D.application program A.computers,cables and network B.clients,servers,and network C.CPUs,memories and I/O devices D.CPUs,hard disks and I/O devices
第2题:
第3题:
第4题:
第5题:
第6题:
The Cisco Smart Business Communications System offers support of third-party applications. What is the primary purpose of the VeraSMART application?()
第7题:
What are two functions that WLAN management provides? ()
第8题:
Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()
第9题:
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You manage a server that runs Windows Server 2008. The server hasTerminal Service Web Access (TS Web Access) installed. Several line-of-business applications areavailable on the server by using TS Web Access. You have a new application installed on the server. Youhave to make the application available through TS Web Access. In order to achieve this,What action should you perform?()
第10题:
Disabling connections from named pipes or socket files (depending on the operating system of the server)
Enabling and using SSL for connections to the Mysql database
Installing Mysql on the application server, and running the database and application on the same server
Starting the server with – bind- address=0.0.0.0 specified
Running the server with – skip-networking specified
Limiting logins to originate from the application server or the server's subnet'
第11题:
Create a Group Policy object (GPO) for restricted groups. Configure the GPO to make the Server Access Team group a member of the Power Users group on each application server. Link the GPO to the Application OU.
Grant the Server Access Team group permissions to modify computer objects in the Application OU.
Move the Server Access Team group object into the Application OU.
Create domain local groups that grant access to the application servers. Grant the Server Access Team group permissions to modify the membership of the domain local groups.
第12题:
Day Zero Revocation engine
SaaS Access Control
Dynamic Vectoring and Streaming engine
Application Visibility and Control
第13题:
In the fields of physical security and information security,access control is the selective restriction of access to a place or other resource.The act of accessing may mean consuming,entering,or using.Permission to access a resource is called authorization(授权).
An access control mechanism(71)between a user(or a process executing on behalf of a user)and system resources,such as applications,operating systems,firewalls,routers,files,and databases.The system must first authenticate(验证)a user seeking access.Typically the authentication function determines whether the user is(72)to access the system at all.Then the access control function determines if the specific requested access by this user is permitted.A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user.The access control function consults this database to determine whether to(73)access.An auditing function monitors and keeps a record of user accesses to system resources.
In practice,a number of(74)may cooperatively share the access control function.All operating systems have at least a rudimentary(基本的),and in many cases a quite robust,access control component.Add-on security packages can add to the(75)access control capabilities of the OS.Particular applications or utilities,such as a database management system,also incorporate access control functions.External devices,such as firewalls,can also provide access control services.
A.cooperates
B.coordinates
C.connects
D.mediates
第14题:
第15题:
第16题:
第17题:
Which three devices are used by the Cisco Wireless Control System (WCS) for wireless management?()
第18题:
What feature on the WSA provides Day Zero Revocation of access to third party sites such as Salesforce?()
第19题:
In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()
第20题:
You have a Web application that is configured for personalization. You need to access personalization data from one of the pages of the Web application by using the minimum amount of administrative effort. What should you do? ()
第21题:
You need to provide users in the research department access to different functions of the Web-based research application based on individual user roles. What should you do?()
第22题:
Events log
System log
User Access log
Admin Access log
第23题:
WLAN controllers
WLAN Solution Engine (WLSE)
Cisco Wireless Control System (WCS)
Cisco Wireless Location Appliance
lightweight access point (AP)
autonomous access point (AP)