niusouti.com

A firewall is a(71)system designed to(72)an organization's network against threats.A.operatingB.programmingC.securityD.data

题目

A firewall is a(71)system designed to(72)an organization's network against threats.

A.operating

B.programming

C.security

D.data


相似考题

1.试题(71)~(75)The software architecture is a set of software components, subsystems, relationships, interactions, the properties of each of these elements, and the set of guiding principles that together constitute the fundamental properties and constraints of a software system or set of systems. (71) defines a general set of element types and their interactions. The examples include Pipes and Filters, Model-View-Controller, and Reflection. A (72) in software architecture is a representation used to understand or document one or more aspects of a problem or solution. Architecture is usually used in conjunction with many adjunct terms. The (73) defines the key strategies, organization, goals and related processes of the enterprise. At the enterprise level, the (74) may be more of a set of guidelines on how the various software architectures should be constructed consistently across the enterprise. The (75), which describes the high-level set of elements involved in application from a particular domain along with their interactions, is often used to focus on subsystem definition rather than application process level definition.(71)A. Architectural patternB. Architectural descriptionC. Architectural viewD. Architectural viewpoint(72)A. modelB. domainC. componentD. subsystem(73)A. enterprise architectureB. technical architectureC. infrastructure architectureD. business architecture(74)A. enterprise architectureB. data architectureC. application architectureD. information architecture(75)A. product-line architectureB. reference architectureC. technology architectureD. infrastructure architecture

更多“A firewall is a(71)system designed to(72)an organization's network against threats.A.opera ”相关问题
  • 第1题:

    We have already covered the topic of network addresses. The first(71) in a block (in classes A,B,and C) defines the network address. In classes A,B,and C,if the hostid is all ls, the address is called a direct broadcast address. It is used by a.() to send a packet to all hosts in a specific network. All hosts will accept a packet having this type of destination address. Note that this address can be used only as a (73)address in an lP packet. Note also that this special address also reduces the number of available hostid for each netid in classes A,B,and C.
    In classes A,B,and C,an address with all Is for the netid and hostid (32 bits) defines a(74) address in the current network.A host that wants to send a message to every other host can use this address as a destination address in an IP packet. However,a router will block a packet having this type ofaddress to confine the broadcasting to the (75) network. Note that this address belongs to class E.

    A.router
    B.switch
    C.huB.
    D.firewall

    答案:A
    解析:

  • 第2题:

    A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network.

    A.channel
    B.path
    C.tunnel
    D.route

    答案:C
    解析:

  • 第3题:

    A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network.

    A.employed
    B.authorized
    C.unauthorized
    D.criminal

    答案:C
    解析:

  • 第4题:

    A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network.

    A.encoded
    B.encrypted
    C.stored
    D.transmitted

    答案:D
    解析:

  • 第5题:

    A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network.

    A.public
    B.private
    C.personal
    D.proper

    答案:B
    解析:

  • 第6题:

    A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network.

    A.network
    B.device
    C.computer
    D.endpoint

    答案:A
    解析: