计算机类
公务员类
工程类
语言类
金融会计类
计算机类
医学类
研究生类
专业技术资格
职业技能资格
学历类
党建思政类
行业认证
全国计算机应用水平考试(NIT)
计算机软件水平考试
计算机等级考试(NCRE)
全国高校计算机等级考试CCT
行业认证
信息素养
单选题Which of the following works similarly to stream ciphers?
进入题库练习
单选题CPUs and operating systems can work in two main types of multitasking modes. What controls access and the use of system resources in preemptive multitasking mode?
进入题库练习
单选题Which of the following is a correct statement regarding computer forensics?
进入题库练习
单选题The trusted computing base (TCB) ensures security within a system when a process in one domain must access another domain in order to retrieve sensitive information. What function does the TCB initiate to ensure that this is done in a secure manner?
进入题库练习
单选题SSL is a de facto protocol used for securing transactions that occur over untrusted networks. Which of the following best describes what takes place during an SSL connection setup process?
进入题库练习
单选题Of the following plans, which establishes senior management and a headquarters after a disaster?
进入题库练习
单选题Which of the following statements is not true of dumpster diving?
进入题库练习
单选题Lisa has learned that most databases implement concurrency controls. What is concurrency, and why must it be controlled?
进入题库练习
单选题Widgets Inc. wishes to protect its logo from unauthorized use. Which of the following will protect the logo and ensure that others cannot copy and use it?
进入题库练习
单选题Data marts, databases, and data warehouses have distinct characteristics. Which of the following does not correctly describe a data warehouse?
进入题库练习
单选题Which of the following best describes Key Derivation Functions (KDFs)?
进入题库练习
单选题Computer programs that are based on human logic by using "if/then" statements and inference engines are called______.
进入题库练习
单选题CrimePreventionThroughEnvironmentalDesign(CPTED)isadisciplinethatoutlineshowtheproperdesignofaphysicalenvironmentcanreducecrimebydirectlyaffectinghumanbehavior.OfCPTED'sthreemaincomponents,whatisillustratedinthefollowingphoto?
进入题库练习
单选题There are several components involved with steganography. Which of the following refers to a file that has hidden information in it?
进入题库练习
单选题IPv6 has many new and different characteristics and functionality compared to IPv4. Which of the following is an incorrect functionality or characteristic of IPv6? ⅰ. IPv6 allows for nonscoped addresses, which enables an administrator to restrict specific addresses for specific servers or file and print sharing, for example. ⅱ. IPv6 has IPSec integrated into the protocol stack, which provides application-based secure transmission and authentication. ⅲ. IPv6 has more flexibility and routing capabilities compared to IPv4 and allows for Quality of Service (QoS) priority values to be assigned to time sensitive transmissions. ⅳ. The protocol offers auto configuration, which makes administration much easier compared to IPv4, and it does not require network address translation (NAT) to extend its address space.
进入题库练习
单选题Virtual storage combines RAM and secondary storage for system memory. Which of the following is a security concern pertaining to virtual storage?
进入题库练习
单选题Therearefourwaysofdealingwithrisk.Inthegraphicthatfollows,whichmethodismissingandwhatisthepurposeofthismethod?
进入题库练习
单选题DNS is a popular target for attackers due to its strategic role on the Internet. What type of attack uses recursive queries to poison the cache of a DNS server?
进入题库练习
单选题Which of the following correctly describes Bluejacking?
进入题库练习
单选题Which of the following occurs in a PKI environment?
进入题库练习