免费智能真题库 > 词库
科目:         
   共14条     1/1页     上一页     下一页   
关键词:    
  SA  
   
G
S
 

隶属试卷 题号 题干 难度系数/错误率
   2023年上半年
   网络工程师
   上午试卷 综合知识
第67题
选择题
FC-SAN存储常通过光纤与服务器的()连接。

32%
   2020年下半年
   网络工程师
   上午试卷 综合知识
第71题
选择题
The Address Resolution Protocol(ARP)was developed to enable communication on an Internetwork and perform a required function in IP routing.ARP lies between layers(71)of the OSI model,and allows computers to introduce each other across a network prior to communication.APR finds the(72 )address of a host from its known(73 )address.Before a device sends a datagram to another device,it looks in ..

53%
   2019年下半年
   网络工程师
   上午试卷 综合知识
第71题
选择题
A virtual(71)network,or VPN, is an encrypted connection over the Internet from a device to a network.The encrypted connection helps ensure that sensitive data is safely(72).It prevents (73)people from eavesdropping on the traffic and allows the user to conduct work remotely.Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a(74).A ..

42%
   2018年上半年
   网络工程师
   上午试卷 综合知识
第71题
选择题
With circuit switching, a (71)path is established between two stations for communication . Switching and transmission resources within the network are (72)for the exclusive use of the circuit for the duration of the connection . The connection is(73):Once it is established ,it appears to attached devices as if there were a direct connection. Packet switching was designed to provide a more ..

57%
   2017年下半年
   网络工程师
   上午试卷 综合知识
第33题
选择题
( )是Linux中Samba的功能。

24%
   2016年下半年
   网络工程师
   上午试卷 综合知识
第71题
选择题
All three types of cryptography schemes have unique function mapping to specific applications.For example, the symmetric key(71) approach is typically used for the encryption of data providing(72), whereas asymmetric key cryptography is mainly used in key(73)and nonrepudiation, thereby providing confidentiality and authentication. The hash(74)(noncryptic), on the other hand, does not pro..

49%
   2016年上半年
   网络工程师
   上午试卷 综合知识
第71题
选择题
Without proper safeguards, every part of a network is vulnerable to a security breach or unauthorized activity from (71), competitors, or even employees. Many of the organizations that manage their own (72) network security and use the Internet for more than just sending/receiving e-mails experience a network (73)—and more than half of these companies do not even know they were attacke..

73%
   2015年上半年
   网络工程师
   上午试卷 综合知识
第71题
选择题
Traditional network layer packet forwarding relies on the information provided by network layer(71)protocols, or static routing, to make an independent forwarding decision at each(72)within the network. The forwarding decision is based solely on the destination (73) IP address. All packets for the same destination follow the same path across the network if no other equal-cost (74)..

33%
   2013年下半年
   网络工程师
   上午试卷 综合知识
第71题
选择题
The de facto standard Application Program Interface (API) for TCP/IP applications is the ”sockets” interface. Although this API was developed for (71) in the early 1980s it has also been implemented on a wide variety of non-Unix systems. TCP/IP (72) written using the sockets API have in the past enjoyed a high degree of portability and we would like the same (73) with IPv6 applications..

56%
   2012年上半年
   网络工程师
   上午试卷 综合知识
第71题
选择题
The TCP protocol is a (71) layer protocol. Each connection connects two TCPs that may be just one physical network apart or located on opposite sides of the globe. In other words, each connection creates a (72) with a length that may be totally different from another path created by another connection. This means that TCP cannot use the same retransmission time for all connections. Selecting a fix..

56%
   2011年下半年
   网络工程师
   上午试卷 综合知识
第71题
选择题
A transport layer protocol usually has several responsibilities. One is to create a process-to-process communication; UDP uses (71) numbers to accomplish this. Another responsibility is to provide control mechanisms at the transport level. UDP does this task at a very minimal level. There is no flow control mechanism and there is no (72) for received packet. UDP, however, does provide error contro..

54%
   2010年下半年
   网络工程师
   上午试卷 综合知识
第71题
选择题
The metric assigned to each network depends on the type of protocol. Some simple protocol, like RIP, treats each network as equals. The (71) of passing through each network is the same; it is one (72) count. So if a packet passes through 10 network to reach the destination, the total cost is 10 hop counts. Other protocols, such as OSPF, allow the administrator to assign a cost for passing through ..

54%
   2010年下半年
   网络工程师
   上午试卷 综合知识
第41题
选择题
按照RSA算法,若选两奇数p=5, q=3,公钥e=7,则私钥d为(41)。

46%
   2010年上半年
   网络工程师
   上午试卷 综合知识
第40题
选择题
杀毒软件报告发现病毒Macro.Melissa,由该病毒名称可以推断出病毒类型是(40), 这类病毒主要感染目标是(41)。

20%
  示例说明:   选择     案例     论文        共14条     1/1页     上一页     下一页   




本网站所有产品设计(包括造型,颜色,图案,观感,文字,产品,内容),功能及其展示形式,均已受版权或产权保护。
任何公司及个人不得以任何方式复制部分或全部,违者将依法追究责任,特此声明。
本站部分内容来自互联网或由会员上传,版权归原作者所有。如有问题,请及时联系我们。


工作时间:9:00-20:00

客服

点击这里给我发消息 点击这里给我发消息 点击这里给我发消息

商务合作

点击这里给我发消息

客服邮箱service@rkpass.cn


京B2-20210865 | 京ICP备2020040059号-5 |京公网安备 11010502032051号 | 营业执照 | Copyright ©2000-2023 All Rights Reserved 软考在线版权所有