当前位置:首页 >课程 >计算机英语

1、Which of the following is not realted to the concept of Integrity

A.Assures that information and programs are changed only in a specified and authorized manner.
B.The data stored on a computer is the same as the source documents.
C.Information should be accessible and useable upon appropriate demand by an autho

参考答案:请扫码使用小程序查看答案

2、Which of the following is not the phase of the life cycle of Virus

A.Dormant Phase:
B.Propagation Phase:
C.Triggering Phase:
D.Destroy Phase

参考答案:请扫码使用小程序查看答案

3、Which of the following is False about Virus

A.We can classify viruses depending on the type of target the virus tries to infect
B.We can classify viruses depending on the the method the virus uses to conceal itself from detection by users and antivirus software.
C.Boot sector infector: Inf

参考答案:请扫码使用小程序查看答案

4、Which of the following is False about Third-Generation Virus scanners

A.These programs are memory-resident programs
B.These programs identify a virus not by its actions but by the structure in an infected program.
C.These programs have the advantage that it is not necessary to develop signatures
D.These programs

参考答案:请扫码使用小程序查看答案

5、Which of the following are the main aspects of Computer Security

A.Prevention against integrity of the asset
B.Security is the protection of assets.
C.Detection of threat to integrity to the asset
D.Re-action if security is breached

参考答案:请扫码使用小程序查看答案

6、Which of the following are the differences between traditional security and information security

A.Information can be stolen - but you still have it
B.Confidential information may be copied and sold - but the theft might not be detected
C.The criminals may be on the other side of the world
D.It requires highly trained and skilled person to

参考答案:请扫码使用小程序查看答案

7、Which of the following is a threat to Software Asset

A.Software, especially application software, is often easy to delete, Software can also be altered or damaged to render it useless.
B.Careful software configuration management, which includes making backups of the most recent version of software, c

参考答案:请扫码使用小程序查看答案

8、Fault isolation is the practice of designing systems such that when "something bad" happens, the negative consequences are unlimited in scope.

A.正确
B.错误

参考答案:请扫码使用小程序查看答案

9、The NIST (National Institute of Standards and Technology) Computer Security Handbook defines computer security as follows: The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integ

A.正确
B.错误

参考答案:请扫码使用小程序查看答案

10、Non-repudiation is the prevention of either the sender or the receiver to acknowledge a transmitted message. A system must be able to prove that certain messages were sent and received. Non-repudiation is often implemented by using digital signatures

A.正确
B.错误

参考答案:请扫码使用小程序查看答案