一起答
单选

FTP是基于(39)实现的文件传输协议,使用此协议进行文件传输时,FTP客户和服务器之间建立的连接是(40)。

  • A.IP
  • B.TCP
  • C.UDP
  • D.ICMP
试题出自试卷《软件水平考试(中级)网络工程师上午(基础知识)试题模拟试卷11》
参考答案
查看试卷详情
相关试题
  1. (17)

    • A.2 kHz
    • B.4 kHz
    • C.16 kHz
    • D.64kHz
  2. (15)

    • A.sends
    • B.personates
    • C.receives
    • D.writes
  3. (16)

    • A.channel
    • B.computation
    • C.speed
    • D.bandwidth
  4. (14)

    • A.asymmetric
    • B.compressed
    • C.irregularity
    • D.symmetric
  5. A typical application of this(71)is ADSL. It is emerging as the technology for home-and small-office Internet connectivity. It provides either 1.5 Mb/s~8 Mb/s from the network to the user and 64 kb/s~512 kb/s in the reverse direction depending on the distance, 12000 or 18000 feet. The different speed for each direction gives it the(72)label. ADSL is designed to take advantage of the fact that video-on demand, telecommuting, and Internet access traffic are inherently asymmetrical. The user(73)a brief message up to the network and receives a ton of data coming back, either a movie or a piece of data download. Under such a scenario, low-speed traffic to the network is just fine. ADSL .delivers high(74)where you need it and only uses a single copper pair. Through multiplexing, it also reserves(75)of the bandwidth for POTS.

    • A.FTTH
    • B.HFC
    • C.FTTC
    • D.HDSL
  6. (11)

    • A.documents
    • B.chips
    • C.appliances
    • D.means
  7. (12)

    • A.silicon
    • B.reengineering
    • C.computer
    • D.software
  8. (10)

    • A.operations
    • B.homogeneities
    • C.creations
    • D.mechanisms
  9. (9)

    • A.devices
    • B.transactions
    • C.communications
    • D.businesses
  10. With hundreds of millions of electronic transactions taking place daily, businesses and organizations have a strong incentive to protect the(66)of the data exchanged in this manner, and to positively ensure the identities of those involved in the(67). This has led to an industry-wide quest for better, more secure methods for controlling IT operations, and for deploying strong security(68)deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the imaginations of the security community has been the development of standards-based security.(69)that can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities in(70)and integrating security provisions at the deepest levels of the machine operation has significant benefits for both users and those responsible for securing IT operations.

    • A.operation
    • B.completeness
    • C.integrity
    • D.interchange