2005年上半年信息系统监理师考试上午试题

来源:计算机等级考试    发布时间:2012-11-04    计算机等级考试视频    评论

  ● 802.3标准中使用的媒体访问控制方式是____(61)____。
  (61)A.Token Ring  B.Token Bus   C.CSMA/CD  D.ALOHA

  ● TCP/IP协议分为四层,分别为应用层、传输层、网际层和网络接口层。不属于应用层协议的是____(62)_____,属于网际层协议的是____(63)_____。
  (62)A.SNMP     B.UDP      C.TELNET   D.FTP
  (63)A.RPC      B.UDP      C.TCP    D.IP

  ● 一个局域网中某台主机的IP 地址为176.68.160.12,使用22 位作为网络地址,那么该局域网的子网掩码为_____(64)____,最多可以连接的主机数为____(65)_____。
  (64) A.255.255.255.0          B.255.255.248.0
     C.255.255.252.0          D.255.255.0.0
  (65) A.254      B.512      C.1022      D.1024

  ● DOM is a platform-and language-____(66)___API that allows programs and scripts to dynamically access and update the content, structure and style of WWW documents (currently, definitions for HTML and XML documents are part of the specification). The document can be further processed and the results of that processing can be incorporated back into the presented ___(67)____.DOM is a ___(68)___-based API to documents ,which requires the whole document to be represented in ____(69)___while processing it .A simpler alternative to DOM is the event –based SAX, which can be used to process very large ___(70)___documents that do not fit info the memory available for processing.
  (66)A.specific   B.neutral    C.contained    D.related
  (67)A.text     B.image     C.page       D.graphic
  (68)A.table     B.tree      C.control     D.event
  (69)A.document   B.processor   C.disc       D.memory
  (70)A.XML      B.HTML      C.script      D.web

  ● Melissa and Love Letter made use of the trust that exists between friends or colleagues. Imagine receiving an __(71)___from a friend who asks you to open it. This is what happens with Melissa and several other similar email __(72)___.Upon running ,such worms usually proceed to send themselves out to email addresses from the victim's address book, previous emails, web pages__(73)___.
  As administrators seek to block dangerous email attachments through the recognition of well-known ___(74)____,virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.
  Frequently ,hackers try to penetrate networks by sending an attachment that looks like a flash movie ,which, while displaying some cute animation ,simultaneously runs commands in the background to steal your passwords and give the __(75)__access to your network.
  (71)A.attachment  B.packet    C.datagram    D.message
  (72)A.virtual    B.virus     C.worms      D.bacteria
  (73)A.memory    B.caches    C.ports      D.registers
  (74)A.names     B.cookies    C.software    D.extensions
  (75)A.cracker    B.user     C.customer    D.client

上一页567下一页

视频学习

我考网版权与免责声明

① 凡本网注明稿件来源为"原创"的所有文字、图片和音视频稿件,版权均属本网所有。任何媒体、网站或个人转载、链接转贴或以其他方式复制发表时必须注明"稿件来源:我考网",违者本网将依法追究责任;

② 本网部分稿件来源于网络,任何单位或个人认为我考网发布的内容可能涉嫌侵犯其合法权益,应该及时向我考网书面反馈,并提供身份证明、权属证明及详细侵权情况证明,我考网在收到上述法律文件后,将会尽快移除被控侵权内容。

最近更新

社区交流

考试问答