欢迎来到淘文阁 - 分享文档赚钱的网站! | 帮助中心 好文档才是您的得力助手!
淘文阁 - 分享文档赚钱的网站
全部分类
  • 研究报告>
  • 管理文献>
  • 标准材料>
  • 技术资料>
  • 教育专区>
  • 应用文书>
  • 生活休闲>
  • 考试试题>
  • pptx模板>
  • 工商注册>
  • 期刊短文>
  • 图片设计>
  • ImageVerifierCode 换一换

    《计算机网络应用基础》——期末复习题及答.pdf

    • 资源ID:56604290       资源大小:67.18KB        全文页数:23页
    • 资源格式: PDF        下载积分:4.3金币
    快捷下载 游客一键下载
    会员登录下载
    微信登录下载
    三方登录下载: 微信开放平台登录   QQ登录  
    二维码
    微信扫一扫登录
    下载资源需要4.3金币
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝    微信支付   
    验证码:   换一换

     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    《计算机网络应用基础》——期末复习题及答.pdf

    中国石油大学(北京)远程教育学院计算机网络应用基础期末复习题一、选择题1.属于计算机网络安全的特征的是(A)A.保密性、完整性、可控性 B.可用性、可控性、可选性C.真实性、保密性、机密性 D.完整性、真正性、可控性2.数据完整性指的是(A)A.保护网络中各系统之间交换的数据,防止因数据被截获而造成泄密B.提供连接实体身份的鉴别C.防止非法实体对用户的主动攻击,保证数据接受方收到的信息与发送方发送的信息完全一致D.确保数据数据是由合法实体发出的3.PPDR模型由四个主要部分组成:(C)、保护、检测和响应。A.安全机制 B.身份认证 C.安全策略 D.加密4.ISO/OSI 参考模型共有(D)层。A.4 B.5 C.6 D.7 5.以下关于对称密钥加密说法正确的是:(C)A.加密方和解密方可以使用不同的算法B.加密密钥和解密密钥可以是不同的C.加密密钥和解密密钥必须是相同的D.密钥的管理非常简单6.以下关于非对称密钥加密说法正确的是:(B )A.加密方和解密方使用的是不同的算法B.加密密钥和解密密钥是不同的C.加密密钥和解密密钥匙相同的D.加密密钥和解密密钥没有任何关系7.不属于数据流加密的常用方法的是(D)。A.链路加密 B.节点加密 C.端对端加密 D.网络加密8.以下算法中属于非对称算法的是(B)。A.DES B.RSA 算法C.IDEA D.三重 DES 9.以下选项中属于常见的身份认证形式的是(A)。A.动态口令牌 B.IP卡 C.物理识别技术 D.单因素身份认证10.数字签名利用的是(A)的公钥密码机制。A.PKI B.SSL C.TCP D.IDS 11.(B)机制的本质特征是:该签名只有使用签名者的私有信息才能产生出来。A.标记 B.签名 C.完整性 D.检测12.以下关于数字签名说法正确的是:(D)A.数字签名是在所传输的数据后附加上一段和传输数据毫无关系的数字信息B.数字签名能够解决数据的加密传输,即安全传输问题C.数字签名一般采用对称加密机制D.数字签名能够解决篡改、伪造等安全性问题13.数字签名常用的算法有(B)。文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6A、DES算法 B、RSA算法 C、DSA算法 D、AES算法14.下列算法中属于 Hash算法的是(C)。A、DES B、IDEA C、SHA D、RSA 15.不属于入侵检测的一般过程的是(C)。A.采集信息 B.信息分析 C.信息分类 D.入侵检测响应16.入侵检测系统的第一步是:(B)A.信息分析 B.信息采集C.信息分类 D.数据包检查17.入侵检测响应的(B)响应可对入侵者和被入侵区域进行有效控制。A.被动 B.主动 C.信息 D.控制18.以下哪一项不属于入侵检测系统的功能:(D)A.监视网络上的通信数据流B.捕捉可疑的网络活动C.提供安全审计报告D.过滤非法的数据包19.不属于常用端口扫描技术的是(B)。A.TCP connect 请求 B.TCP SZN请求C.IP 分段请求 D.FTP反射请求20.基于主机的扫描器是运行在被检测的(A)上的。A.主机 B.服务器 C.浏览器 D.显示器21.特洛伊木马(简称木马)是一种(C)结构的网络应用程序。A.B/S B.Web C.C/S D.Server 22.缓冲区溢出是利用系统中的(A)实现的。文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6A.堆栈 B.队列 C.协议 D.端口23.堆栈是一个(A)的队列。A.后进先出 B.后进后出 C.先进后出 D.先进先出24.DOS是以停止(D)的网络服务为目的。A.目标服务器 B.目标浏览器 C.目标协议 D.目标主机25.正常情况下,建立一个 TCP连接需要一个三方握手的过程,即需要进行(C)次包交换。A.一 B.二 C.三 D.四26.对付网络监听最有效的方法是(B)。A.解密 B.加密 C.扫描 D.检测27.TCP序列号欺骗是通过TCP的(C)次握手过程,推测服务器的响应序列号而实现的。A.一 B.二 C.三 D.四28.以下不属于入侵检测方法的是(C )。A模式识别B.概率统计分析C.密文分析D.协议分析29.基于主机的入侵检测系统用于防止对(D)节点的入侵。A.多机 B.网络 C.对称 D.单机30.现在的 Firewall多是基于(A)技术。A.自适应代理 B.加密 C.入侵检测 D.PKI 31.不属于 Firewall的功能的是(C)。A网络安全的屏障 B.强化网络安全策略文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6C.对网络存取和访问进行加速 D防止内部信息的外泄32.目前 Firewall一般采用(B)NAT。A.单向 B.双向 C.多向 D.网络33.防火墙中地址转换的主要作用是:(B)A.提供代理服务B.隐藏内部网络地址C.进行入侵检测D.防止病毒入侵34.包过滤 Firewall工作在(C)层上。A.物理 B.会话 C.网络 D.传输35.代理 Firewall通过编制的专门软件来弄清用户(D)层的信息流量,并能在用户层和应用协议层间提供访问控制。A.物理 B.会话 C.网络 D.应用36.代理 Firewall工作在(B)上,使用代理软件来完成对数据报的检测判断,最后决定其能否穿过Firewall。A.物理、应用 B.会话、应用 C.网络、会话 D.应用、传输37.仅设立防火墙系统,而没有(C ),防火墙就形同虚设。A管理员B.安全操作系统C.安全策略D.防毒系统38.Web浏览器通过(A)与服务器建立起TCP/IP 连接。A.三次握手 B.四次握手 C.三次挥手 D.四次挥手39.SSL 提供了一种介于(D)之间的数据安全套接层协议机制。A.物理、应用 B.会话、应用 C.网络、会话 D.应用、传输40.SSL 握手协议的一个连接需要(D)个密钥。A.一 B.二 C.三 D.四文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B641.WWW 服务中,(B)。ACGI 程序和 Java applet程序都可对服务器端和客户端产生安全隐患BCGI程序可对服务器端产生安全隐患,Java applet可对客户端产生安全隐患CCGI 程序和 Java applet都不能对服务器端和客户端产生安全隐患DJava applet 程序可对服务器端产生安全隐患,CGI程序可对客户端产生安全隐患42.不属于 VPDN 使用的隧道协议的是(D)。A第二层转发协议 B点到点的隧道协议C第二层隧道协议 D.网到网的通信协议43.基本的 PKI 系统不包括以下哪项内容(B)。A.CA BBA C.SA D.KCA 44.公钥基础设施是基于(B)密码技术的。A.对称 B.非对称 C.公约 D.数字45.不属于 PKI 可以为用户提供的基本安全服务的是(D)。A.认证服务 B.数据完整性服务C.数据保密性服务 D.公平服务E.不可否认性服务46.目前,采用 PKI技术保护电子邮件安全的协议主要有(B)和 S/MIME文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6协议。A.PSP B.PGP C.BGB D.BSB 47.(A)是指虚拟专用网络。A.VPN B.WPN C.WSN D.VSN 48.(D)密码技术用于初始化SSL连接。A.入侵 B.检测 C.数字 D.公钥49.IMS 是(A)系统。A.入侵检测系统 B.自动加密系统C.入侵管理系统 D.网络安全系统50.身份认证机制一般包括三项内容:(B)、授权和审计。A.登陆 B.认证 C.检测 D.校验51.不属于网络安全的三种机制的是(D)。A.加密机制 B.控制机制 C.监督机制 D.检测机制52 根据检测原理可将检测系统分为3 类,以下选项不正确的是(D)。A.异常检测 B.滥用监测 C.混合检测 D.入侵检测53.关于堡垒主机的配置,叙述不正确的是(D)。A.堡垒主机上所有不必需的服务、协议、程序和网络接口都应删除或禁用B堡垒主机上记录所有安全事件的安全日志都应该启动C堡垒主机上所有用户的账号和密码应该被加密保存D堡垒主机的速度应尽可能快54(D )协议主要用于加密机制。文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M8 ZZ5X10X7O4B6文档编码:CH3A6A1Q8K7 HI9A7A10O7M

    注意事项

    本文(《计算机网络应用基础》——期末复习题及答.pdf)为本站会员(H****o)主动上传,淘文阁 - 分享文档赚钱的网站仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知淘文阁 - 分享文档赚钱的网站(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    关于淘文阁 - 版权申诉 - 用户使用规则 - 积分规则 - 联系我们

    本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

    工信部备案号:黑ICP备15003705号 © 2020-2023 www.taowenge.com 淘文阁 

    收起
    展开