一起答
单选

特洛伊木马一般分为服务器端和客户端,如果攻击主机为X,目标主机为Y,则(16)。

  • A.X既为服务器端又为客户端
  • B.Y既为服务器端又为客户端
  • C.X为服务器端,Y为客户端
  • D.Y为服务器端,X为客户端
试题出自试卷《软件水平考试(初级)程序员上午(基础知识)模拟试卷24》
参考答案
查看试卷详情
相关试题
  1. To accommodate the longest path allowed by 802.3, the slot time has been set to 512 bit times, or(75).

    • A.521μs
    • B.5.12μs
    • C.0.512μs
    • D.512μs
  2. Every host and muter on the Internet has an IP address,which encodes its(69).

    • A.host number
    • B.host number and socket
    • C.network number
    • D.host number and network number
  3. When you choose a command name that is followed by "…" on menu, a(72)box appears in which you provide more information.

    • A.dialog
    • B.list
    • C.check
    • D.text
  4. The Pentium includes hardware for both segmentation and paging. Both mechanisms can be disabled, allowing the user to choose from four distinct views of memory. Now the most frequently used view(such as UNIX System V)is(67).

    • A.Unsegmented unpaged memory
    • B.Unsegmented paged memory
    • C.Segmented unpaged memory
    • D.Segmented paged memory
  5. The typical firewall consists of two packet filters and a(an)(68).

    • A.router
    • B.bridge
    • C.application
    • D.server
  6. In a computer, which of the following is the longest period?(66).

    • A.Beat period
    • B.Machine period
    • C.Instruction period
    • D.CPU period
  7. (73)

    • A.右递归
    • B.左递归
    • C.直接左递归
    • D.直接右递归
  8. (71)

    • A.短语
    • B.素短语
    • C.句柄
    • D.直发短语
  9. (72)

    • A.归约
    • B.移进
    • C.推理
    • D.推导
  10. (70)

    • A.算符优先分析法
    • B.LL(1)分析法
    • C.递归子程序分析法
    • D.预测分析法