一起答
单选

只有得到允许的人才能修改数据,并能够识别出数据是否已经被篡改。这属于信息安全5个要素中的(11)。根据美国国防部和国家标准局的《可信计算机系统评测标准》,标记安全保护的安全级别为(12)。

  • A.机密性
  • B.完整性
  • C.可用性
  • D.可审查性
参考答案
查看试卷详情
相关试题
  1. (82)

    • A.same
    • B.different
    • C.difference
    • D.some
  2. (81)

    • A.two related keys are
    • B.a key is
    • C.two unrelated keys are
    • D.three keys are
  3. (80)

    • A.synchronous
    • B.Asynchronous
    • C.symmetric
    • D.asymmetric
  4. (79)

    • A.a key
    • B.two keys
    • C.three keys
    • D.four keys
  5. (77)

    • A.in general
    • B.in any term
    • C.in set terms
    • D.in terms of
  6. In the following essay, each blank has four choices. Choose the most suitable one from the four choices and write down in the answer sheet. There are two types of key technology: private key and public key. Private-key encryption methods are called(71)ciphers, information is encrypted with(72)both the sender and receiver hold privately. Public-key encryption methods are called(73)ciphers,(74)created for each user, encryption key and decryption key are(75)

    • A.synchronous
    • B.Asynchronous
    • C.symmetric
    • D.asymmetric
  7. (76)

    • A.faced on
    • B.faced with
    • C.faced about
    • D.faced up to
  8. (75)

    • A.consolidates
    • B.consists
    • C.considerate
    • D.consoles
  9. (74)

    • A.same
    • B.similar
    • C.different
    • D.difference
  10. In the following essay, each blank has four choices. Choose the most suitable one from the four choices and write down in the answer sheet. Heterogeneous network environments consist of computer systems from(66)vendors that run(67)operating systems and communication protocols. An organization that(68)its computer resources is usually(69)the task of integrating its heterogeneous systems. Typically, each deparlment or division has defined its own network needs(70)OS, LAN topology, communication protocols, applications, and other components.

    • A.same
    • B.similar
    • C.different
    • D.difference