试题详情
- 单项选择题 With hundreds of millions of electronic (11)taking place daily, businesses and organizations have a strong incentive to protect the. (12) of the data exchanged in this manner, and to positively ensure the (13) of those involved in the transactions. This has led to an industry-wide quest for better, more secure methods for controlling IT operations,and for deploying strong security mechanisms deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the imaginations of the security community has been the development of standards-based security(14) that can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities in (15) and integrating security provisions at the deepest levels of the machine operation has significant benefits for both users and those responsible for securing IT operations. 空白处(12)应选择()
A、operation
B、completeness
C、integrity
D、interchange
- C
关注下方微信公众号,在线模考后查看
热门试题
- 网络管理员通过 CLI 输入一个命令,该
- 若在同一计算机中存在两块有相同中断号的网
- 信元交换适宜于对带宽要求高和对服务质量要
- 按使用范围划分,网络被划分为:()和()
- 当端口由于违规操作而进入“err-dis
- 资源系统中管线设施的逻辑资源是指无地理信
- 经常与黑客软件配合使用的是()。
- 路由器在7层网络参考模型各层中涉及()层
- 用户通过哪一层连接到局域网?()
- B—ISDN在低层采用了X.25协议。
- 在以太网中,帧的长度有一个下限,这主要是
- 分析网络的性能约束时,客户最关注的网络性
- 为综合布线方案设计的依据是:()。
- 广域网覆盖的地理范围从几十公里到几千公里
- 交换式局域网的核心是()。
- RARP协议的主要功能是()。
- 网络安全是在分布网络环境中对()提供安全
- 计算机网络中广泛使用的交换技术是()。
- 一个局域网络是由网络互联设备、传输介质加
- 以下属于C类IP地址的是()