The major technical areas of computer security are usually represented by the initials CIA(71),integrity,and authentication or availability.
A.confidentiality
B.confident
C.secret
D.safety
第1题:
One solution to major security problems is ______, which are frequently installed to fix known security holes.
A.patches
B.compensations
C.complements
D.additions
第2题:
One solution to major security problems is(71), which are frequently installed to fix known security holes。
A.additions
B.compensations
C.patches
D.complements
第3题:
The computer you are using is protected usually by______.
A.password
B.key
C.mouse
D.USB
第4题:
●The (75)is designed specifically as a security system for preventing unauthorized communications between one computer network and another computer network.
(75)A.firewall
B.protocol
C.hacker
D.virus
第5题:
Miao Yue usually_______(play) computer games on weekends.
第6题:
第7题:
The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()
第8题:
Which two companies are major competitors to IBM Maximo Asset Management solutions?()
第9题:
Your network contains a computer named Computer1 that runs Windows 7.You need to verify if Computer1 has active DirectAccess connections to the network.What should you do?()
第10题:
You upgrade five computers in the Finance organizational unit (OU) from Windows NT Workstation 4.0 to Windows 2000 Professional. The computers are used by members of the Finance OU to run financial Applications. All five computers are configured to have the default security settings. A user named Helene reports that she can no longer log run the financial applications on her Windows 2000 Professional computer. Prior to the upgrade, Helene was able to run the financial applications on her computer. Helene is a member of the local Users group. You want the financial applications to run on her computer. What should you do?()
第11题:
Run Winrm.exe quickconfig.
From Windows Firewall with Advanced Security, select Export Policy.
From Windows Firewall with Advanced Security, click Inbound Rules and then click Export List.
Open Local Security Policy. Right-click IP Security Policies on Local Computer and then click Export List.
第12题:
A scientist in a laboratory developing plans for a space station.
A technical writer sending via computer documents created at home.
A computer technician repairing an office computer network.
A teacher directing computer-assisted learning in a private school.
第13题:
Password is a(n)(71)series of characters that enables a user(72)a file, computer or program. On multi - user systems,(73)user must enter his or her password(74)the computer will respond to commands. The password helps ensure that unauthorized users do not access the computer. In addition, data files and programs may require a password.
Ideally, the password should be something(75)could guess. In practice, most people choose a password that is easy to remember, such as their name or their initials. This is one reason it is relatively easy to break into most computer system.
A.obvious
B.secret
C.important
D.easy
第14题:
People usually install(10)to fix known security holes.
A.patches
B.compensations
C.complements
D.additions
第15题:
The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()
A. intrusion protection
B. identity
C. secure connectivity
D. security management
第16题:
It is true that until very recently the general view was that social security “represented a type of luxury and was essentially anti-economic.” It was seen as merely government expenditure for the needy.
[精解] 本题考核知识点:主语从句的翻译
第一个句子的主干成分是it is true,其中it为形式主语,that引导的从句为真正的主语。由于主语太长,可以将谓语部分提前译为“诚然”。主语从句的主干是the general view was that…,until very recently突出强调了所述现象存在的时间,在翻译时,可以单独译成“直到最近”。主语从句中又包含了that引导的表语从句。后一句是一个简单的被动语态结构It was seen as …,考生注意翻译时应将主语代词it 指代的对象译出,在句中它指代的是“社会保障”。
词汇:represented“代表”;luxury“奢侈,享受”。Essentially“基本的,本质的”。Expenditure“开支,费用”。Needy“贫困的”,在句中与定冠词the搭配,特指一类人,可以译为“贫困群体”。
译文 :诚然,直到最近,普遍的观点依然认为社会保障“体现的是一种享受,从本质上讲是反经济的”。它仅仅被看作是政府用于贫困群体的开支。
第17题:
UCLA had taken away all Social Security numbers from common usage to ensure the computer security.
第18题:
In which areas do SMBs tend to require better products than found in retail stores?()
第19题:
Who is ultimately responsible for the security of a computer based information system within any organization?在任何机构内,哪一项是计算机信息系统安全的根本原因()
第20题:
You have a combined Windows 2000 and Windows 98 network that contain sensitive data. You want to utilize as many new Windows 2000 security features as possible. You want to customize a security policy on each computer to ensure that data is kept confidential and secured. Allcomputers must still be able to communicate with each other over the network. What should you do?()
第21题:
You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()
第22题:
cavitation
electrolysis
abrasion
corrosion
第23题:
Deploy a Windows Server 2003 computer running SUS in the test network. Deploy SUS servers in each child domain to download administrator-approved updates from the test network SUS server
Deploy a Windows Server 2003 computer running SUS in the test network Use autoupdate policies in each child domain to download and deploy updates from the test network SUS server
Install MBSA on a Windows Server 2003 computer in the network network. Deploy MBSA as a Windows Installer package to all computers in the child domains, and configure MBSA to scan for updates from the server in the test network
Install IIS on a Windows Server 2003 computer in the test network. Create a Web site named Updates on this server. Configure an autoupdate policy in each child domain to download and deploy updates from the Updates Web site