试题详情
- 单项选择题 With hundreds of millions of electronic (11)taking place daily, businesses and organizations have a strong incentive to protect the. (12) of the data exchanged in this manner, and to positively ensure the (13) of those involved in the transactions. This has led to an industry-wide quest for better, more secure methods for controlling IT operations,and for deploying strong security mechanisms deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the imaginations of the security community has been the development of standards-based security(14) that can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities in (15) and integrating security provisions at the deepest levels of the machine operation has significant benefits for both users and those responsible for securing IT operations. 空白处(13)应选择()
A、identities
B、homogeneities
C、creations
D、operations
关注下方微信公众号,在线模考后查看

热门试题
- 在SNMPc中,用于紧急状态轮询的阈值报
- 计算机病毒可分为:()病毒、()病毒、多
- ICMP协议是直接承载在()协议之上的。
- 简述什么是计算机网络拓扑结构及其结构类型
- 关于SNMPv3框架结构的描述中,错误的
- OSI参考模型是由()提出与制定的。
- 信元交换适宜于对带宽要求高和对服务质量要
- 由于IP地址通常是针对一台主机而言的,而
- 下列哪个地址是电子邮件地址()
- 在RMON2 IMB中,网络层主机组基于
- 在PPP协议的协商报文中,()字段的作用
- 以下对MAC地址描述正确的是()。
- 一般来说,RMON的目标是(),从而减少
- 在通信协议操作方面,SNMPv2增加了两
- 校园网主干可采用的网络技术包括:()。
- 在Internet域名体系中,域的下面可
- 阐述层次型网络设计的原则及每层的功能?
- 简述路由器的工作原理?
- TCP/IP中Ftp的默认端口号是()。
- 在计算机网络通信系统中,作为信源的计算机