● (73) is the first line of protect between your computer and the public Internet.
(73)
A. The Internet protocol
B. The firewall
C. The anti-virus software
D. The intrusion-detection systems
第1题:
( )is the first line of protect between your computer and the public Internet.
A.The Internet protocolB.The firewallC.The anti-virus software D.The intrusion-detection systems
第2题:
Computer hardware engineers research, design, develop, and test computer hardware and supervise its manufacture and(73). Hardware refers to computer(74), circuit boards, computer systems, and related equipment such as keyboards, modems, and printers.
A.fixing
B.building
C.setting
D.installation
第3题:
Basically, a(71)is a standalone process or a set of integrated processes that runs on a router or server to control the flow of(72)application traffic(73)through it. Typically, firewalls are(74)on the entry point to a public network such as the Internet. They could be considered traffic cops. The firewall' s(75)is to ensure that all communication between an organization's network and the Internet conform. to the organization's security policies.
A.router
B.client
C.firewall
D.switch
第4题:
One of the basic rules of computer security is to change your(73)regularly.
A.name
B.computer
C.device
D.password
第5题:
You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter.Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.You need to configure the wireless connection to allow your computer to discover other computers.What should you do?()

A.A
B.B
C.C
D.D
第6题:
The main feature of(72)is that they follow a first-come/first-served rule. For instance, the line of(73)waiting to be run on a computer system.
A.looplinks
B.queues
C.stacks
D.trees
第7题:
● The most important program on any computer is (73) .
(73)
A. Office 2000
B. Virus
C. software
D. Operating System
第8题:
第9题:
第10题:
A router that performs Network Address Translation (NAT) is installed between your computer and the Internet. The router fails. You connect the computer directly to the Internet. You need to ensure that the computer is connected to the Internet in the most secure manner possible. What should you do?()
第11题:
You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network. You need to configure the wireless connection to allow your computer to discover other computers. What should you do?()
第12题:
A
B
C
D
第13题:
● (73) provides a data path between the CPU and external devices.
(73)
A. Keyboard
B. I/O port
C. Disk
D. Printer
第14题:
● The program and the data are kept inside the computer in a place called
(73) .
(73)
A. bus
B. cache
C. CPU
D. memory
第15题:
Personal firewall is a technology that helps(66)intruders from accessing data on your PC via the Internet or another network, by keeping(67)data from entering or exiting your system.
Hackers do not just target national security organizations for(68): They want your tax returns, network passwords, or bank account numbers. And you do not want the FBI kicking in your door because someone hijacked your PC to(69)in the latest denial-of-service attack on the Internet. Now that "always-on" broadband connections such as cable modems and digital subscriber line are becoming more popular, home users are at risk. Fortunately, you can protect your data. Firewalls can block(70)attacks and protect your PC from outside threats.
A.allow
B.prevent
C.invite
D.get
第16题:
Without systems software, application software in a computer is(73)
A.nouse
B.useful
C.useness
D.useless
第17题:
A router that performs Network Address Translation (NAT) is installed between your computer and the Internet.The router fails. You connect the computer directly to the Internet.You need to ensure that the computer is connected to the Internet in the most secure manner possible.What should you do?()

A.A
B.B
C.C
D.D
第18题:
● One of the basic rules of computer security is to change your(73) regularly.
(73)
A. name
B. computer
C. password
D. device
第19题:
● Stack is quite simple. Many computer systems have stacks built into their circuitry. They also have machine-level instructions to operate the hardware stack. Stack is (73)in computer systems.
(73)
A.useless
B.not important
C.simple but important
D.too simple to be useful
第20题:
第21题:
Which of the following will help protect an operating system from vulnerability?()
第22题:
All servers in your environment run Windows Server 2003. Your companys network includes multiple network segments and multiple routers. A member server that has the Routing and Remote Access service (RRAS) installed provides Internet connectivity for all client computers. The RRAS server is located in a perimeter network (also known as DMZ). A client computer named Client1 is unable to connect to the Internet. The RRAS server is able to connect to the Internet. You need to pinpoint the location of the network issue. What should you do?()
第23题:
You use a Windows 2000 Professional computer at home. You need to access shared files on a server named server1. This server is on your company’s network and is not accessible from the Internet. Your company’s network also includes a third party VPN server that is accessible from the Internet. You dial in to your Internet service provider and then create a VPN connection to your company’s VPN server. After the connection is successfully established, you run the net view //server1 command and receive the following error ‘the server is inaccessible or could not be found’. You need to access the shared files on server 1. What should you do?()