【名词&注释】
数字证书(digital certificate)、数据包(packet)、企业法人(enterprise legal person)、技术人员(technician)、数据源(data source)、技术保护措施(technological protection measures)、计算机信息网络(computer information network)、性问题(sex problem)、暂行规定(interim provisions)、非经营活动
[单选题]以下关于公钥基础设施(PKI)的说法中,正确的是()
A. PKI 可以解决公钥可信性问题(sex problem)
B. PKI 不能解决公钥可信性问题(sex problem)
C. PKI 只能由政府来建立
D. PKI 不提供数字证书查询服务
查看答案&解析查看所有试题
学习资料:
[单选题]基于网络的入侵检测系统利用()作为数据源。
A. 审计记录
B. 日志记录
C. 网络数据包
D. 加密数据
[单选题]Why is (1) fun?What de lights may itS practitioner expect as his reward? First is the sheer joy of making things. As the child delights in his mud pie, so the adult enjoys building things, especially things of his own design. Second is the pleasure of making things that are useful to other people. Third is the fascination of fashioning complex puzzle-like objects of interlocking moving parts and watching them work in subtle cycles, playing out the consequences of principles built in from the beginning. Fourth is the joy of always learning, which springs from the (2) nature of the task. In one way or another the problem is ever new, and its solver learns something: sometimes (3), sometimes theoretical, and sometimes both. Finally, there is the delight of working in such a tractable medium. The (4), like the poet, works only slightly removed from pure thought-stuff. Few media of creation are so flexible, so easy to polish and rework, so readily capable of realizing grand conceptual structures.Yet the program (5), unlike the poet's words, is real in the sense that it moves and works, producing visible outputs separate from the construct itself. It prints results, draws pictures, produces sounds, moves arms. Programming then is fun because it gratifies creative longings built deep within us and delights sensibilities we have in common with all men.
A. (1)
B. programming
C. composing
D. working
E. writing
[单选题]《中华人民共和国计算机信息网络(computer information network)国际联网管理暂行规定(interim provisions)》规定:从事国际联网经营活动的和从事非经营活动的接入单位必须具备下列条件:(54)。(1)是依法设立的企业法人或者事业法人
A. (2)具有相应的计算机信息网络(computer information network)、装备以及相应的技术人员和管理人员
B. (3)具有健全的安全保密管理制度和技术保护措施
C. (4)符合法律和国务院规定的其他条件
D. (1)(4)
E. (1)(2)(4)
F. (1)(3)(4)
G. 以上全是
本文链接:https://www.51ksbd.net/show/j8vq9n.html