软件水平考试考试真题及详解5节.docx
《软件水平考试考试真题及详解5节.docx》由会员分享,可在线阅读,更多相关《软件水平考试考试真题及详解5节.docx(24页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、软件水平考试考试真题及详解5节软件水平考试考试真题及详解5节 第1节通过反复使用保证无损连接性,又保持函数依赖的分解,能保证分解之后的关系模式至少达到( )。A.1NFB.2NFC.3NFD.BCNF答案:C解析:本题考査函数依赖的基础知识。关系模式的分解,必须保证分解具有无损连接性,即分解能够被还原,否则会发生信息丢失(通过自然连接还原关系时会产生多余的记录)。分解保持函数依赖,至少能到3NF。PPP中的安全认证协议是_,它使用三次握手的会话过程传送密文。A.MD5B.PAPC.CHAPD.HASH答案:C解析:PPP认证是可选的。PPP扩展认证协议(Extensible Authentic
2、ation Protocol,EAP)可支持多种认证机制,并且允许使用后端服务器来实现复杂的认证过程。例如通过Radius服务器进行Web认证时,远程访问服务器(RAS)只是作为认证服务器的代理传递请求和应答报文,并且当识别出认证成功/失败标志后结束认证过程。通常PPP支持的两个认证协议是:口令验证协议(Password Authentication Protocol,PAP):提供了一种简单的两次握手认证方法,由终端发送用户标识和口令字,等待服务器的应答,如果认证不成功,则终止连接。这种方法不安全,因为采用文本方式发送密码,可能会被第三方窃取;质询握手认证协议(Challenge Hands
3、hake Authentication Protocol,CHAP):采用三次握手方式周期地验证对方的身份。首先是逻辑链路建立后认证服务器就要发送一个挑战报文(随机数),终端计算该报文的Hash值并把结果返回服务器,然后认证服务器把收到的Hash值与自己计算的Hash值进行比较,如果匹配,则认证通过,连接得以建立,否则连接被终止。计算Hash值的过程有一个双方共享的密钥参与,而密钥是不通过网络传送的,所以CHAP是更安全的认证机制。在后续的通信过程中,每经过一个随机的间隔,这个认证过程都可能被重复,以缩短入侵者进行持续攻击的时间。值得注意的是,这种方法可以进行双向身份认证,终端也可以向服务器进
4、行挑战,使得双方都能确认对方身份的合法性。The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer ( ) between a client and server on a computer network.FTP is built on a ( ) model architecture using separate control and data connections between the client and the server. FTP use
5、rs may authenticate themselves with a ( ) sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/T
6、LS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).The first FTP client applications were ( ) programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities hav
7、e since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.FTP may run in (请作答此空) mode, which determines how the data connection is established. In both cases, the client creates a TCP control connect
8、ion from a random, usually an unprivileged, port N to the FTP server command port 21.In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a da
9、ta channel to the client from its port 20, the FTP server data port.In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives
10、 a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the p
11、assive mode at that time, updating it to extended passive mode.A.systemB.activeC.passiveD.active or passive答案:D解析:The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network.FTP is built on a client-server
12、model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure
13、 transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).The first FTP client applications were command-line programs developed before operating systems had graphical user interfaces,
14、and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.FTP may run in activ
15、e or passive mode, which determines how the data connection is established. In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.In active mode, the client starts listening for incoming data connections from the s
16、erver on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.In situations where the client is behind a firewall and unable to accept incoming TCP connections, pa
17、ssive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address
18、and server port number received.Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.在Windows系统中,采用(请作答此空)程序可以合并卷上的可用空间,使每个文件和文件夹占用卷上连续的磁盘空间,这样可以便系统( )。A.任务计划B.资源监视器C.碎片整理D.性能监视器答案:C解析:磁盘碎片整理
19、程序(Disk defragmenter)是一种用于分析本地卷以及查找和修复碎片文件和文件夹的系统实用程序。磁盘碎片整理程序的命令是defrag命令,可以通过命令行对磁盘执行碎片整理。关于对软件需求分析的描述,不正确的是( )。A.需求分析的任务是解决目标系统怎么做的问题B.需求分析阶段研究的对象是软件项目的用户要求C.分析需求应该包括业主单位隐含的需求D.需求分析包括确定软件设计的约束和软件同其他系统元素的接口答案:A解析:需求分析的任务是解决目标系统“做什么”的问题,而概要设计和详细设计阶段解决的是“怎么做”。某企业委托软件公司设计企业管理系统,该系统涉及企业的许多商业机密,对软件安全性、
20、可靠性、易用性等方面提出了较高的要求。8、为了达到预期的安全性,测试人员采用了静态代码安全测试、动态渗透测试、程序数据扫描三种方法对系统进行安全性测试。其中, (1) 对应用系统进行攻击性测试,从中找出系统运行时所存在的安全漏洞; (2) 在早期的代码开发阶段完成; (3) 通过内存测试来发现缓冲区溢出类的漏洞。9、为了方便用户使用本系统,测试人员对软件的易用性进行了测试。功能易用性测试是软件易用性测试的一个方面,它包括业务符合性、功能定制性、业务模块的集成度、数据共享能力、约束性、交互性和错误提示等。其中, (4) 是测试界面风格、表格设计、数据加密机制等是否符合相关的法律法规及使用人员的习
21、惯; (4) 是测试数据库表的关联和数据重用程度; (6) 是测试关键操作前是否有明确提示。(4)(6)的备选答案:A业务符合性测试B业务模块的集成度测试C约束性测试D功能定制性测试E数据共享能力F错误提示测试10、为了验证系统的可恢复性,测试人员从自动恢复和人工恢复两个方面着手测试。自动恢复需验证数据恢复、 (7) 和 (8) 等机制的正确性;需人工干预的系统恢复还需 (9) ,确定其是否在可接受的范围内。(7)(9)的备选答案:A重新初始化B数据备份C重新启动D关闭系统E界面刷新F估计平均修复时间G估计平均故障时间11、技术员小张选择以下三个实例对系统进行测试:A输入错误的密码B手工拔下客
22、户端的网线,在许可的时间范围内再插上C关闭服务器电源,判断备份机器是否能够正常启动其中, (10) 进行的是可恢复性测试; (11) 进行的是安全测试; (12) 进行的是故障转移测试。答案:解析:8、(1)程序数据扫描 (2)静态代码 (3)动态渗透 9、(4)A (5)E (6)F 10、(7)B (8)C (9)F 11、(10)8 (11)A (12)C大型复杂项目,一般具有周期较长规模较大、目标构成复杂等特征,因此大型复杂项目的控制过程与普通项目的控制过程有较大差别。( ) 不属于大型复杂项目控制过程的重要因素。A.项目绩效跟踪B.外部变更请求C.变更控制D.里程碑设置答案:D解析:
23、在大型及复杂项目的管理中,项目控制过程的3个重要因素是外部变更请求、变更控制、项目绩效跟踪。软件水平考试考试真题及详解5节 第2节ARP攻击造成网络无法跨网段通信时可以使用 () 命令清除受攻击影响的ARP缓存。A.arp -s B.arp -dC.arp -allD.arp -a答案:B解析:处理ARP攻击的方法为首先断开ARP攻击主机的网络连接,然后用“arp -d” 命令清除受攻击影响的ARP缓存。以下关于软件开发的叙述中,不正确的是( )。A.软件要设计得尽量通用,要尽量考虑到长远的需求和应用领域的扩展B.软件开发者对所开发软件性能的了解程度取决于对该软件的测试程度C.软件越复杂则维护
24、越困难,尽量保持简洁是软件设计的一条重要原则D.正常情况下,软件维护期远超实现期,所以,降低维护成本比降低实现成本更重要答案:A解析:本题考查软件工程(软件开发)基础知识。软件设计要根据用户需求进行。有些开发者故意扩大需求,希望软件能更通用些,应用领域更广些,软件生命期更长远些,但其结果是,软件的复杂性增加了,测试也难以充分进行,软件质量反而下降,交付期也不得不延长,用户反而不满意。还不如按照用户近期的切实需求进行开发,待应用一段时间后,再考虑升级版本,拓展应用。软件开发者对所开发软件的功能肯定是非常熟悉的,但对其实际运行的性能(例如响应时间,并发用户数量的影响等)可能不太了解。大部分性能可以
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 软件 水平 考试 详解
限制150内