●The (75)is designed specifically as a security system for preventing unauthorized communi

题目

●The (75)is designed specifically as a security system for preventing unauthorized communications between one computer network and another computer network.

(75)A.firewall

B.protocol

C.hacker

D.virus

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?

A.To prevent unauthorized hosts from getting access to the LAN

B.To limit the number of Layer 2 broadcasts on a particular switch port

C.To prevent unauthorized Telnet or SSH access to a switch port

D.To prevent the IP and MAC address of the switch and associated ports

E.None of the above


正确答案:A
解析:Explanation:
You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that port is assured the full bandwidth of the port.

If a port is configured as a secure port and the maximum number of secure MAC addresses is reached, when the MAC address of a station attempting to access the port is different from any of the identified secure MAC addresses, a security violation occurs. Also, if a station with a secure MAC address configured or learned on one secure port attempts to access another secure port, a violation is flagged.

第2题:

TCP(Transmission Control Protocol)was specifically designed to provide a reliable end-to-end byte stream over a(n)(70).

A.IP address

B.reliable network

C.socket

D.unreliable internetwork


正确答案:D
解析:TCP(传输控制协议)被设计成一个基于不可靠的网络上实现可靠的点到点的比特流协议。

第3题:

TCP(Transmission Control Protocol) was specifically designed to provide a reliable end-to-end byte stream over a(n)

A.IP address

B.reliable network

C.socket

D.unreliable internetwork


正确答案:D

第4题:

Why would a network administrator configure port security on a switch?()

  • A、to prevent unauthorized Telnet access to a switch port
  • B、to limit the number of Layer 2 broadcasts on a particular switch port
  • C、to prevent unauthorized hosts from accessing the LAN
  • D、to protect the IP and MAC address of the switch and associated ports
  • E、to block unauthorized access to the switch management interfaces over common TCP ports

正确答案:C

第5题:

Without proper safeguards,every part of a network is vulnerable to a security breach or unauthorized activity from(71),competitors,or even employees.Many of the organizations that manage their own(72)network security and use the Internet for more than just sending/receiving e-mails experience a network(73)—and more than half of these companies do not even know they were attacked.Smaller(74)are often complacent,having gained a false sense of security.They usually react to the last virus or the most recent defacing of their website.But they are trapped in a situation where they do not have the necessary time and(75)to spend on security.

A.exterior
B.internal
C.centre
D.middle

答案:B
解析:

第6题:

A firewall is a security system designed to(62) an organization's network against(63).

A.prevent

B.protect

C.develop

D.exploit


正确答案:C

第7题:

Transverse frames are more widely spaced on a ship that is designed with the ______.

A.Centerline system of framing

B.Isometric system of framing

C.Longitudinal system of framing

D.Transverse system of framing


正确答案:C

第8题:

Virus Security Software is designed to detect, eliminate or quarantine computer viruses before they are able to harm a computer or server networked system.

A.Anti

B.Invade

C.Inroad

D.Aggression


正确答案:A
解析:反病毒安全软件是被设计用来在计算机病毒破坏计算机或服务器网络系统前监测、排除或隔离它们。

第9题:


The other distinguishing trait of the law( )

A.punishment is carried out by the courts at all levels
B.rules and court practices initiated by a governmental agency are specifically designed to increase government control
C.a system of rules governing a conduct,activity or event incidental by nature
D.any governmental reinforcement

答案:C
解析:

第10题:

Which of the following expansion card slots was designed specifically for video cards?()

  • A、 PCIe
  • B、 ISA
  • C、 AGP
  • D、 PCIx

正确答案:C

更多相关问题