当前位置:首页 >课程 >计算机英语

1、Which of the following statement is True about Internet Gateway

A.From the point of view of a single domain, the portion of the lnternet lying outside of its gateway is sometimes called the cloud, because domain controls it.
B.Internet outside the domain’s gateway is controlled by Gateway
C.Any message being

参考答案:请扫码使用小程序查看答案

2、Which of the following statement is True about Internet Addressing

A.In the case of large domains, a local authority might break its domain into subdomains, in which case the mnemonic addresses of the computers within the domain might be shorter.
B.In the case of small domains, a local authority might break its do

参考答案:请扫码使用小程序查看答案

3、Which of the following statement is False about Private Cloud

A.Private Cloud deployment was meant to sell capacity over the Internet through publicly accessible interfaces.
B.Private clouds give local users a flexible and agile private infrastructure
C.Local user use Private Cloud to run service workloads

参考答案:请扫码使用小程序查看答案

4、Which of the following statement is True about Private Cloud

A.Private clouds cannot support a hybrid cloud model but requires supplementing local infrastructure with computing capacity from an external Public cloud.
B.Private clouds cannot support a hybrid cloud model but requires supplementing local infras

参考答案:请扫码使用小程序查看答案

5、Which of the following is not the design objectives for cloud computing

A.Shifting computing from data centers to desktops
B.Service provisioning and cloud economics
C.Scalability in performance
D.New Standards and Interfaces

参考答案:请扫码使用小程序查看答案

6、Which of the following is not a proper way to guard your computer

A.Put a cable lock on the computer.
B.Not to leave passwords nearby in a place accessible by others.
C.Not to etch your driver’s license number or social security number into your equipment.
D.Use very strong password to your computer

参考答案:请扫码使用小程序查看答案

7、Which of the following is realted to the concept of Confidentiality

A.The prevention of unauthorized disclosure of information
B.Assures that individuals control or influence
C.What information related to them may be collected and stored and by whom
D.To whom that information may be disclosed

参考答案:请扫码使用小程序查看答案

8、Which of the following is not realted to the concept of Integrity

A.Assures that information and programs are changed only in a specified and authorized manner.
B.The data stored on a computer is the same as the source documents.
C.Information should be accessible and useable upon appropriate demand by an autho

参考答案:请扫码使用小程序查看答案

9、Which of the following is False about Virus

A.We can classify viruses depending on the type of target the virus tries to infect
B.We can classify viruses depending on the the method the virus uses to conceal itself from detection by users and antivirus software.
C.Boot sector infector: Inf

参考答案:请扫码使用小程序查看答案

10、Which of the following is False about First-Generation Virus scanners

A.It requires a virus signature to identify a virus
B.The virus may contain “wildcards”
C.They have essentially the same structure and bit pattern in all copies
D.Such signature-specific scanners can detect known and unknown viruses.

参考答案:请扫码使用小程序查看答案

11、Which of the following statement are True about Internet Domains

A.The establishment of domains is overseen by the Internet Corporation for Assigned Names and Numbers
B.ICANN which is a profit making corporation established to coordinate the naming of domains and the assignment of Internet addresses.
C.To esta

参考答案:请扫码使用小程序查看答案

12、Which of the following statement are True about Internet Architecture

A.If one "stood" at a domain's gateway and "looked out" into the cloud, one could find a homogeneous structures.
B.lnternet has grown in a somewhat haphazard way
C.The gateways of a number of domains are connected to form a regional network of ga

参考答案:请扫码使用小程序查看答案

13、Choose all the correct statements for High-Throughput Computing (HTC)

A.Cloud computing is a high-throughput computing paradigm
B.HTC infrastructure provides the services only through a large data center
C.The cloud computing model enables users to share access to resources from anywhere at any time through their c

参考答案:请扫码使用小程序查看答案

14、In developing a security policy, a security manager needs to consider which of the following factors:

A.The value of the assets being protected
B.The vulnerabilities of the system
C.Potential threats and the likelihood of attacks
D.Ease of use versus security

参考答案:请扫码使用小程序查看答案

15、Which of the following are the differences between traditional security and information security

A.Information can be stolen - but you still have it
B.Confidential information may be copied and sold - but the theft might not be detected
C.The criminals may be on the other side of the world
D.It requires highly trained and skilled person to

参考答案:请扫码使用小程序查看答案

16、The Internet can be viewed as a collection of domains. Each domain is an autonomous system that can be configured as the local authority desires. It might consist of a single computer or a complex internet consisting of many LANs, MANs, but not WANs.

A.正确
B.错误

参考答案:请扫码使用小程序查看答案

17、Cluster computing or High-Performance computing frameworks is a form of computing in which bunch of computers (often called nodes) that are connected through a LAN (local area network) so that, they behave like a single machine.

A.正确
B.错误

参考答案:请扫码使用小程序查看答案

18、Utility and Software as a Server (SaaS) provide computing resources as a server with the notion of pay per use. Cloud computing leverages dynamic resources to deliver large numbers of servers to end users.

A.正确
B.错误

参考答案:请扫码使用小程序查看答案

19、Cloud computing applies a virtual platform with elastic resources put together by on-demand provisioning of hardware, software, and data sets, dynamically.

A.正确
B.错误

参考答案:请扫码使用小程序查看答案

20、An encryption key is typically a random string of bits generated specifically to scramble and unscramble cryptic data

A.正确
B.错误

参考答案:请扫码使用小程序查看答案