更多“The major technical areas of computer security are usually represented by the initials CIA ”相关问题
  • 第1题:

    One solution to major security problems is ______, which are frequently installed to fix known security holes.

    A.patches

    B.compensations

    C.complements

    D.additions


    正确答案:A
    解析:译文的含义是:()是解决主要安全问题的一种方法,它通常被安装来解决已知的安全漏洞。A、B、C、D各选项的意思分别是:补丁、补偿物、补充、插件。所以本题应该选择A。

  • 第2题:

    One solution to major security problems is(71), which are frequently installed to fix known security holes。

    A.additions

    B.compensations

    C.patches

    D.complements


    正确答案:C
    解析:补丁是解决主要安全问题的方法,通过安装补丁可解决已知的安全漏洞。

  • 第3题:

    The computer you are using is protected usually by______.

    A.password

    B.key

    C.mouse

    D.USB


    正确答案:A
    解析:您所用的计算机通常用口令来保护。

  • 第4题:

    ●The (75)is designed specifically as a security system for preventing unauthorized communications between one computer network and another computer network.

    (75)A.firewall

    B.protocol

    C.hacker

    D.virus


    正确答案:A

  • 第5题:

    Miao Yue usually_______(play) computer games on weekends.


    正确答案:
     38.plays

  • 第6题:

    根据下面资料,回答
    Today, people all over the world are moving out of small villages in the country to go and live in big, noisy cities. They are moving from the peaceful hills, mountains, fields, rivers and streams of the countryside to the busy world of streets, buildings, traffic and crowds. This movement from rural areas to urban areas has been going on for over two hundred years.
    In many countries, the main reason why people come to live in towns and cities is work. After one or two large factories have been built in or near a town, people come to find work, and soon an industrial area begins to grow. There is usually a residential area nearby, where the factory workers can live. The families of these workers need schools, hospitals and shops, so more people come to live in the area to provide these services and a city grows.
    In every major city in the world, there is a business district where the big companies have their main offices. In the United States, this area is usually in the city centre. It is here that you can see the huge skyscraper office blocks. The people who work here often travel a long way to work each day. Many of them live in the suburbs of the city, far away from the industrial area and the city centre. Some suburbs are very pleasant, with nice houses and big gardens. There are usually parks for children to play in and large department stores where you can buy all you need.
    But what is the future of the big cities? Will they continue to get bigger? Perhaps not. Some major cities have actually become smaller in the last ten years, and it is quite possible that one day we will see people moving out of the major cities and back into smaller towns and villages.
    We can easily know that the underlined phrase "urban areas" in the first paragraph means_____________.

    A.areas of the countryside
    B.areas of a town or city
    C.areas near the countryside
    D.areas near a town or city

    答案:B
    解析:
    词义题。由第一段中“…people…are moving…to go and live in big,noisy cities.They are moving…to the busy world…”可判断答案为B。

  • 第7题:

    The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()

    • A、intrusion protection
    • B、identity
    • C、secure connectivity
    • D、security management

    正确答案:B,D

  • 第8题:

    Which two companies are major competitors to IBM Maximo Asset Management solutions?()

    • A、SAP
    • B、Oracle
    • C、Candle
    • D、Informix
    • E、Computer Associates

    正确答案:A,B

  • 第9题:

    Your network contains a computer named Computer1 that runs Windows 7.You need to verify if Computer1 has active DirectAccess connections to the network.What should you do?()

    • A、From Network Connections, right-click the active network connection, and then click Status.
    • B、From Network Connections, select the active network connection, and then click Diagnose this connection.
    • C、From Windows Firewall with Advanced Security, click Monitoring, and then click Connection Security Rules.
    • D、From Windows Firewall with Advanced Security, click Monitoring, click Security Associations, and then click Main Mode.

    正确答案:D

  • 第10题:

    You upgrade five computers in the Finance organizational unit (OU) from Windows NT Workstation 4.0 to Windows 2000 Professional. The computers are used by members of the Finance OU to run financial Applications. All five computers are configured to have the default security settings. A user named Helene reports that she can no longer log run the financial applications on her Windows 2000 Professional computer. Prior to the upgrade, Helene was able to run the financial applications on her computer. Helene is a member of the local Users group. You want the financial applications to run on her computer. What should you do?()

    • A、 Use Computer Management to configure separate memory space for each financial application on Helene’s computer.
    • B、 Use Security Templates to edit the Security Policy to include the financial application onHelene’s computer. Then add Helene’s user account to the Power Users group on Helene’s computer.
    • C、 Use Security Configuration and Analysis to reconfigure the default security policy .inf to allow financial  applications to run on Helene’s computer.
    • D、 Use Secedit.exe to apply the Compatws.inf security template on Helene’s Security Policy toloosen the permissions for the local Users group on Helene’s computer.

    正确答案:D

  • 第11题:

    单选题
    You have two computers named Computer1 and Computer2 that run Windows 7. You need to ensure thatComputer2 has exactly the same firewall rules as Computer1.  What should you do on Computer1?()
    A

    Run Winrm.exe quickconfig.

    B

    From Windows Firewall with Advanced Security, select Export Policy.

    C

    From Windows Firewall with Advanced Security, click Inbound Rules and then click Export List.

    D

    Open Local Security Policy. Right-click IP Security Policies on Local Computer and then click Export List.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following is example of telecommuting as described in the passage ?
    A

    A scientist in a laboratory developing plans for a space station.

    B

    A technical writer sending via computer documents created at home.

    C

    A computer technician repairing an office computer network.

    D

    A teacher directing computer-assisted learning in a private school.


    正确答案: B
    解析:

  • 第13题:

    Password is a(n)(71)series of characters that enables a user(72)a file, computer or program. On multi - user systems,(73)user must enter his or her password(74)the computer will respond to commands. The password helps ensure that unauthorized users do not access the computer. In addition, data files and programs may require a password.

    Ideally, the password should be something(75)could guess. In practice, most people choose a password that is easy to remember, such as their name or their initials. This is one reason it is relatively easy to break into most computer system.

    A.obvious

    B.secret

    C.important

    D.easy


    正确答案:B

  • 第14题:

    People usually install(10)to fix known security holes.

    A.patches

    B.compensations

    C.complements

    D.additions


    正确答案:A
    解析:人们常常安装补丁程序以修复已知的安全漏洞。

  • 第15题:

    The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()

    A. intrusion protection

    B. identity

    C. secure connectivity

    D. security management


    参考答案:B, D

  • 第16题:

    It is true that until very recently the general view was that social security “represented a type of luxury and was essentially anti-economic.” It was seen as merely government expenditure for the needy.


    正确答案:

    [精解] 本题考核知识点:主语从句的翻译

    第一个句子的主干成分是it is true,其中it为形式主语,that引导的从句为真正的主语。由于主语太长,可以将谓语部分提前译为“诚然”。主语从句的主干是the general view was that…,until very recently突出强调了所述现象存在的时间,在翻译时,可以单独译成“直到最近”。主语从句中又包含了that引导的表语从句。后一句是一个简单的被动语态结构It was seen as …,考生注意翻译时应将主语代词it 指代的对象译出,在句中它指代的是“社会保障”。

    词汇:represented“代表”;luxury“奢侈,享受”。Essentially“基本的,本质的”。Expenditure“开支,费用”。Needy“贫困的”,在句中与定冠词the搭配,特指一类人,可以译为“贫困群体”。

    译文 :诚然,直到最近,普遍的观点依然认为社会保障“体现的是一种享受,从本质上讲是反经济的”。它仅仅被看作是政府用于贫困群体的开支。

  • 第17题:

    UCLA had taken away all Social Security numbers from common usage to ensure the computer security.


    正确答案:

  • 第18题:

    In which areas do SMBs tend to require better products than found in retail stores?()

    • A、voice, intranet, and security
    • B、wireless, intranet, and wide-area networking
    • C、wireless, security, and voice
    • D、security, voice, and wide-area networking

    正确答案:C

  • 第19题:

    Who is ultimately responsible for the security of a computer based information system within any organization?在任何机构内,哪一项是计算机信息系统安全的根本原因()

    • A、an operational issue.操作问题
    • B、a management issue.管理问题
    • C、a training issue.培训问题
    • D、a technical issue.技术问题

    正确答案:B

  • 第20题:

    You have a combined Windows 2000 and Windows 98 network that contain sensitive data. You want to utilize as many new Windows 2000 security features as possible. You want to customize a security policy on each computer to ensure that data is kept confidential and secured. Allcomputers must still be able to communicate with each other over the network. What should you do?()

    • A、Use the security configuration and analysis console to improve the HISECWS security  template file.
    • B、Use the local computer policy to disable the access this computer from the network option.
    • C、Use SECEDIT to reconfigure the computer default security settings to not allow anonymous  access to the computer.
    • D、Create a policy that excludes write access to the windows 2000 computers then apply the  policy to all non-windows 2000 computers.
    • E、None of the above, Windows 9X systems cannot be secured using security template files.

    正确答案:E

  • 第21题:

    You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()

    • A、Use secedit.exe to refresh the security policy.
    • B、Use the local computer policy to configure the local security policy.
    • C、Use security configuration and analysis to support the security files as a .pol file.
    • D、Use computer management to configure the security policy setting.

    正确答案:B

  • 第22题:

    单选题
    Pitting in the suction areas of a centrifugal pump bronze impeller is usually caused by ().
    A

    cavitation

    B

    electrolysis

    C

    abrasion

    D

    corrosion


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    You need to design a method to automate the deployment of critical updates and security patches that are supplied by Microsoft as these updates and security patches are released. Your solution must meet technical requirements. What should you do?()
    A

    Deploy a Windows Server 2003 computer running SUS in the test network. Deploy SUS servers in each child domain to download administrator-approved updates from the test network SUS server

    B

    Deploy a Windows Server 2003 computer running SUS in the test network Use autoupdate policies in each child domain to download and deploy updates from the test network SUS server

    C

    Install MBSA on a Windows Server 2003 computer in the network network. Deploy MBSA as a Windows Installer package to all computers in the child domains, and configure MBSA to scan for updates from the server in the test network

    D

    Install IIS on a Windows Server 2003 computer in the test network. Create a Web site named Updates on this server. Configure an autoupdate policy in each child domain to download and deploy updates from the Updates Web site


    正确答案: C
    解析: 暂无解析