【名词&注释】
电子邮件(e-mail)、垃圾邮件(spam)、精心设计(careful design)、特洛伊木马(trojan horse)、存储空间(storage space)、钓鱼网站、个人资料(personal data)、攻击方式(attacking mode)、详细信息(detailed information)、防火墙等
[单选题]信息安全管理体系是指()
A. 网络维护人员的组织体系
B. 信息系统的安全设施体系
C. 防火墙等设备设施构建的安全体系
D. 组织建立信息安全方针和目标并实现这些目标的体系
查看答案&解析查看所有试题
学习资料:
[单选题]As an operating system repeatedly allocates and frees storage space, many physically separated unused areas appear. This phenomenon is called (71).
A. fragmentation
B. compaction
C. swapping
D. paging
[单选题]利用电子邮件引诱用户到伪装网站,以套取用户的个人资料(personal data)(如信用卡号码),这种欺诈行为是(6)。
A. 垃圾邮件攻击
B. 网络钓鱼
C. 特洛伊木马
D. 未授权访问
[多选题]按照IEEE 802.1d协议,当交换机端口处于 ( ) 状态时,既可以学习MAC帧中的源地址,又可以把接收到的MAC帧转发到适当的端口。 B.学习(learning)
A. 转发(forwarding)
B. 监听(listening)
[单选题]We know a computer is a machine that processes data(stored in main memory)into information, under control of a stored program. We also know that, internally, a computer is a binary machine; thus the data and the program instruictions must be stored in binary form. Characters are represented in(71). Numbers are stored as binary numbers, with each bit's positional value significant. A computer's main memory is divided into bytes, words or both(depending on the system), and each of these basic storage units is assigned an(72). Using this address, the processor can read or write selected bytes or words.The processor consists of a clock, an instruction control unit, an arithmetic and logic unit, and registers. Once a program is stored in main memory, the processor can begin to execute it. During(73), the instruction control unit fetches an instruction from main memory; during(74), the arithmetic and logic unit executes it. Precisely timed electronic pulses generated by the clock drive this basic(75)
A. a binary code
B. words
C. registers
D. positional values
本文链接:https://www.51ksbd.net/show/6ey8zg.html