网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

● (73) is the first line of protect between your computer and the public Internet.

(73)

A. The Internet protocol

B. The firewall

C. The anti-virus software

D. The intrusion-detection systems


参考答案

更多 “ ● (73) is the first line of protect between your computer and the public Internet.(73)A. The Internet protocolB. The firewallC. The anti-virus softwareD. The intrusion-detection systems ” 相关考题
考题 A Web (73) is one of many software applications that function as the interfacebetween a user and the Internet.(73)A. displayB. browserC. windowD. view

考题 Firewall is a (74) mechanism used by organizations to protect their LANs from the Internet.(74)A. reliableB. stableC. peacefulD. security

考题 ● A Web ___(73)___ is one of many software applications that function as the interfacebetween a user and the Internet.(73)A. display B. browser C. window D. view

考题 Stack is quite simple. Many computer systems have stacks built into their circuitry. They also have machine-level instructions to operate the hardware stack. Stack is(73)in computer systems.A.uselessB.not importantC.simple but importantD.too simple to be useful

考题 ( )is the first line of protect between your computer and the public Internet.A.The Internet protocolB.The firewallC.The anti-virus software D.The intrusion-detection systems

考题 ● (73) provides a data path between the CPU and external devices.(73)A. KeyboardB. I/O portC. DiskD. Printer

考题 Computer hardware engineers research, design, develop, and test computer hardware and supervise its manufacture and(73). Hardware refers to computer(74), circuit boards, computer systems, and related equipment such as keyboards, modems, and printers.A.fixingB.buildingC.settingD.installation

考题 ● The program and the data are kept inside the computer in a place called(73) .(73)A. busB. cacheC. CPUD. memory

考题 Basically, a(71)is a standalone process or a set of integrated processes that runs on a router or server to control the flow of(72)application traffic(73)through it. Typically, firewalls are(74)on the entry point to a public network such as the Internet. They could be considered traffic cops. The firewall' s(75)is to ensure that all communication between an organization's network and the Internet conform. to the organization's security policies.A.routerB.clientC.firewallD.switch

考题 Personal firewall is a technology that helps(66)intruders from accessing data on your PC via the Internet or another network, by keeping(67)data from entering or exiting your system.Hackers do not just target national security organizations for(68): They want your tax returns, network passwords, or bank account numbers. And you do not want the FBI kicking in your door because someone hijacked your PC to(69)in the latest denial-of-service attack on the Internet. Now that "always-on" broadband connections such as cable modems and digital subscriber line are becoming more popular, home users are at risk. Fortunately, you can protect your data. Firewalls can block(70)attacks and protect your PC from outside threats.A.allowB.preventC.inviteD.get

考题 One of the basic rules of computer security is to change your(73)regularly.A.nameB.computerC.deviceD.password

考题 Without systems software, application software in a computer is(73)A.nouseB.usefulC.usenessD.useless

考题 You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter.Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.You need to configure the wireless connection to allow your computer to discover other computers.What should you do?()A.AB.BC.CD.D

考题 A router that performs Network Address Translation (NAT) is installed between your computer and the Internet.The router fails. You connect the computer directly to the Internet.You need to ensure that the computer is connected to the Internet in the most secure manner possible.What should you do?()A.AB.BC.CD.D

考题 The main feature of(72)is that they follow a first-come/first-served rule. For instance, the line of(73)waiting to be run on a computer system.A.looplinksB.queuesC.stacksD.trees

考题 ● One of the basic rules of computer security is to change your(73) regularly.(73)A. nameB. computerC. passwordD. device

考题 ● The most important program on any computer is (73) .(73)A. Office 2000B. VirusC. softwareD. Operating System

考题 ● Stack is quite simple. Many computer systems have stacks built into their circuitry. They also have machine-level instructions to operate the hardware stack. Stack is (73)in computer systems.(73)A.uselessB.not importantC.simple but importantD.too simple to be useful

考题 共用题干 第三篇Internet shopping is a new way of shopping. Nowadays,you can shop for just about anything from your armchair. All you need is a computer which is linked to the Internet. Shopping on the Internet is becoming increasingly popular. In the United States,people spent over$2.5 billion on Internet shopping in 1998.This figure is expected to reach $11 billion by the year 2004.People can shop for a variety of products on the Internet. Physical products include items such as books,CDs,clothes and food.These types of products are the most common purchases through the Internet. You can also buy information products such as on-line news or magazine stories,or you can download computer software through the Internet. Services such as booking airline tickets,reserving hotels or renting cars are also available on the Internet. You can also go shopping on the Internet for entertainment services and take part in on-line games.Internet shopping offers a number of benefits for the shopper. The most important advantage is convenience.You can shop whenever you like as the on-line shops are open 24 hours a day and you don't have to queue with other shoppers at the check-out counters.Secondly,it is easy to find what you are looking for on the Internet. Even out-of-print books may be ordered on line.Finally,it is often cheaper to buy goods through the Internet,and you can tell the shop exactly what you want.The main disadvantage of Internet shopping is that you cannot actually see the products you are buying or check their quality.Also,many people enjoy shopping in the city and miss the opportunity to talk to friends.Some people are worried about paying for goods using credit cards,so Internet companies are now finding ways to make on-line payment safe.Internet shopping is sure to become more and more popular in the years ahead.It promises to change the way we buy all kinds of things一from tonight's dinner to a new car.The disadvantages of Internet shopping include all of the following EXCEPT that_______.A:customs cannot actually see the products they are buyingB:customs cannot check the product's quantity they are buyingC:many people enjoy shopping in the city and miss the opportunity to talk to friendsD:some people are worried about paying for goods using credit cards

考题 共用题干 第三篇Internet shopping is a new way of shopping. Nowadays,you can shop for just about anything from your armchair. All you need is a computer which is linked to the Internet. Shopping on the Internet is becoming increasingly popular. In the United States,people spent over$2.5 billion on Internet shopping in 1998.This figure is expected to reach $11 billion by the year 2004.People can shop for a variety of products on the Internet. Physical products include items such as books,CDs,clothes and food.These types of products are the most common purchases through the Internet. You can also buy information products such as on-line news or magazine stories,or you can download computer software through the Internet. Services such as booking airline tickets,reserving hotels or renting cars are also available on the Internet. You can also go shopping on the Internet for entertainment services and take part in on-line games.Internet shopping offers a number of benefits for the shopper. The most important advantage is convenience.You can shop whenever you like as the on-line shops are open 24 hours a day and you don't have to queue with other shoppers at the check-out counters.Secondly,it is easy to find what you are looking for on the Internet. Even out-of-print books may be ordered on line.Finally,it is often cheaper to buy goods through the Internet,and you can tell the shop exactly what you want.The main disadvantage of Internet shopping is that you cannot actually see the products you are buying or check their quality.Also,many people enjoy shopping in the city and miss the opportunity to talk to friends.Some people are worried about paying for goods using credit cards,so Internet companies are now finding ways to make on-line payment safe.Internet shopping is sure to become more and more popular in the years ahead.It promises to change the way we buy all kinds of things一from tonight's dinner to a new car.On-line news and magazine stories are_______.A:the most popular products on the InternetB:not yet available on the InternetC:free to download through the InternetD:information products available on the Internet

考题 共用题干 第三篇Internet shopping is a new way of shopping. Nowadays,you can shop for just about anything from your armchair. All you need is a computer which is linked to the Internet. Shopping on the Internet is becoming increasingly popular. In the United States,people spent over$2.5 billion on Internet shopping in 1998.This figure is expected to reach $11 billion by the year 2004.People can shop for a variety of products on the Internet. Physical products include items such as books,CDs,clothes and food.These types of products are the most common purchases through the Internet. You can also buy information products such as on-line news or magazine stories,or you can download computer software through the Internet. Services such as booking airline tickets,reserving hotels or renting cars are also available on the Internet. You can also go shopping on the Internet for entertainment services and take part in on-line games.Internet shopping offers a number of benefits for the shopper. The most important advantage is convenience.You can shop whenever you like as the on-line shops are open 24 hours a day and you don't have to queue with other shoppers at the check-out counters.Secondly,it is easy to find what you are looking for on the Internet. Even out-of-print books may be ordered on line.Finally,it is often cheaper to buy goods through the Internet,and you can tell the shop exactly what you want.The main disadvantage of Internet shopping is that you cannot actually see the products you are buying or check their quality.Also,many people enjoy shopping in the city and miss the opportunity to talk to friends.Some people are worried about paying for goods using credit cards,so Internet companies are now finding ways to make on-line payment safe.Internet shopping is sure to become more and more popular in the years ahead.It promises to change the way we buy all kinds of things一from tonight's dinner to a new car.The most proper title for this passage is"_______".A:People Enjoy Many Ways of ShoppingB:The Advantages and Disadvantages of Internet ShoppingC:The Bright Future of Internet ShoppingD:A New Way of Shopping一Internet Shopping

考题 Which of the following will help protect an operating system from vulnerability?()A、Download free anti-virus programs from the Internet.B、Perform updates from the manufacturers website regularly.C、Using the operating systems email program only to open attachments.D、Monitoring what is displayed on the screen.

考题 A router that performs Network Address Translation (NAT) is installed between your computer and the Internet.  The router fails. You connect the computer directly to the Internet.  You need to ensure that the computer is connected to the Internet in the most secure manner possible.  What should you do?()A、Enable the Remote Desktop feature in the System Properties dialog box.B、Configure the network category of your network connection to Public.C、Configure the network category of your network connection to Private.D、Enable the Windows Collaboration Computer Name Registration Service exception in Microsoft Windows Firewall.

考题 All servers in your environment run Windows Server 2003. Your companys network includes multiple network segments and multiple routers. A member server that has the Routing and Remote Access service (RRAS) installed provides Internet connectivity for all client computers. The RRAS server is located in a perimeter network (also known as DMZ). A client computer named Client1 is unable to connect to the Internet. The RRAS server is able to connect to the Internet. You need to pinpoint the location of the network issue.  What should you do?()A、 Use the nbtstat command-line tool on Client1.B、 Use the pathping command-line tool on Client1.C、 Run the nbtstat -r command on the RRAS server.D、 Run the ping -a Client1 command on the RRAS server.

考题 You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter. Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.  You need to configure the wireless connection to allow your computer to discover other computers.  What should you do?()A、Configure the network category of your wireless network connection to Private.B、Configure the network category of your wireless network connection to Public.C、Configure the TCP/IP packet filtering on the wireless network connection.D、Configure the wireless network connection with the appropriate authentication to the router.

考题 You use a Windows 2000 Professional computer at home. You need to access shared files on a server named server1. This server is on your company’s network and is not accessible from the Internet. Your company’s network also includes a third party VPN server that is accessible from the Internet. You dial in to your Internet service provider and then create a VPN connection to your company’s VPN server. After the connection is successfully established, you run the net view //server1 command and receive the following error ‘the server is inaccessible or could not be found’. You need to access the shared files on server 1. What should you do?()A、Stop and then start the TCP/IP NetBIOS helper service on your computer.B、Stop and then start the DNS client service on your computer.C、Add a HOSTS entry for server1 to your computer.D、Add a LMHOSTS entry for server1 to your computer.

考题 单选题Your company security policy does not allow you to connect your servers directly to the internet. You would like to utilize some of theYour company? security policy does not allow you to connect your servers directly to the internet. You would like to utilize some of the functionality in Solaris 10 to analyze your systems for available OS updates, and also download and install those updates from Sun Microsystems.  Which answer describes how to utilize this functionality to analyze your systems for available OS updates, and also download and install those updates without connecting your server directly to the internet? ()A AB BC CD D