一起答

软件水平考试(初级)网络管理员上午(基础知识)模拟试卷28

  • 卷面总分:75分
  • 浏览次数:0
  • 测试费用:免费
  • 答案解析:是
  • 练习次数:8次
  • 作答时间:150分钟
试卷简介
部分试题预览
  1. (86)

    • A.same
    • B.different
    • C.difference
    • D.some
  2. (84)

    • A.synchronous
    • B.Asynchronous
    • C.symmetric
    • D.asymmetric
  3. (85)

    • A.two related keys are
    • B.a key is
    • C.two unrelated keys are
    • D.three keys are
  4. In the following essay, each blank has four choices. Choose the most suitable one from the four choices and write down in the answer sheet. There are two types of key technology: private key and public key. Private-key encryption methods are called(71)ciphers, information is encrypted with(72)both the sender and receiver hold privately. Public-key encryption methods are called(73)ciphers,(74)created for each user, encryption key and deception key are(75)

    • A.synchronous
    • B.Asynchronous
    • C.symmetric
    • D.asymmetric
  5. (83)

    • A.a key
    • B.two keys
    • C.three keys
    • D.four keys
  6. (81)

    • A.in general
    • B.in any term
    • C.in set terms
    • D.in terms of
  7. (80)

    • A.faced on
    • B.faced with
    • C.faced about
    • D.faced up to
  8. (79)

    • A.consolidates
    • B.consists
    • C.considerate
    • D.consoles
  9. In the following essay, each blank has four choices. Choose the most suitable one from the four choices and write down in the answer sheet. Heterogeneous network environments consist of computer systems from(66)vendors that run(67)operating systems and communication protocols. An organization that(68)its computer resources is usually(69)the task of integrating its heterogeneous systems. Typically, each deparlment or division has defined its own network needs(70)OS, LAN topology, communication protocols,applications, and other components.

    • A.same
    • B.similar
    • C.different
    • D.difference
  10. (78)

    • A.same
    • B.similar
    • C.different
    • D.difference