一起答
单选

●Network (71)  h

  • as full rights and permissions to all resources on a network.    (71) A.user    &n
  • bsp;  B.guest    
  • C.a
  • dministrator
  • D.owner
试题出自试卷《2011年网络管理员考试考前密卷(二)-上午试题》
参考答案
查看试卷详情
相关试题
  1. ●In recent ye

    • ars,TCP/IP has also
    • begun to be used by telephone
    • companies to provi
    • de faster,cheaper telephone (74) .    (74) A.transmitting 
    • B.transmited   
    • C.transfers
    • D.transmissions
  2. ●C++is used with proper (75) design techniques.

    (75)

    • A.o
    • bje
    • ct-oriente
    • d
    • B.object-based
    • C.face to object
    • D.face to target
  3. ●Note:M

    • ake&n
    • bsp;(72) regularly in data pro
    • cessing.    (72) A.e
    • dit
    • B.insert
    • C.format
    • D.Back up
  4. ●During the l

    • ast few years,it has
    • been realized that maintenan
    • ce of programs is more expensive than
    • development,so reading of programs by humans is as important as (73) them.    (73) A.editing
    • B.writed
    • C.written
    • D.writing
  5. ●Network (71)  h

    • as full rights and permissions to all resources on a network.    (71) A.user    &n
    • bsp;  B.guest    
    • C.a
    • dministrator
    • D.owner
  6. ●Melissa and Love Letter made use of the trust that exists between friends or colleagues.Imagine receiving an  (66)  from a friend who asks you to open it.This is what happens with Melissa and several other similar email  (67) .Upon running, such worms usually proceed to send themselves out to email addresses from the victim's address book,previous emails, web pages  (68) .

    • As administrators seek to block dangerous email attachments through the recognition of well-known  (69) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a who
    • B.packet
    • C.datagram
    • D.message    (67)  A.virtual
    • B.virus
    • C.worms
    • D.bacteria    (68)  A.memory
    • B.caches
    • C.ports
    • D.registers    (69)  A.names
  7. ●防火墙技术可以分为 (65) 等3大类型。

    (65)

    • A.包过滤、入侵检测和数据加密    &n
    • bsp;  B.包过滤、入侵检测和应用代理    
    • C.IP过滤、线路过滤和入侵检测    
    • D.IP过滤、线路过滤和应用代理
  8. ●网络常见的故障不含 (64) 。

    (64)

    • A.物理故障    &n
    • bsp;  B.配置故障    
    • C.程序故障      
    • D.系统故障
  9. ●网络性能管理是指 (63) 。

    (63)

    • A.维护网络设备,保证网络性能    &n
    • bsp;  B.监视网络运行过程中的主要性能指标,报告网络性能变化趋势,提供决策依据    
    • C.在脱机条件下分析故障,找出可能的问题    
    • D.限制非法用户使用网络资源
  10. ●下列各项不属于代理服务器功能的有 (62) 。

    (62)

    • A.信息过滤    &n
    • bsp;  B.地址转换    
    • C.域名解析    
    • D.信息缓存