- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 4、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 5、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 6、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 7、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
                        查看更多
                        
                    
                2015网络信息技术应用与网络安全-继续教育(国外英文资料)
                    2015网络信息技术应用与网络安全-继续教育(国外英文资料)
2015 application of network information technology and network security
A total of 4 major questions, total score of 100 points, 60 points pass
Top of form
A RadioButtonList (10 items, 3 points for each question)
1, select the option that may specify the function of the specified page as the starting page.
? A, select tools -Internet options -  General tab
B, options, collection, commands, menus
C? -Internet, select tools -  Options tab
? D, select tools -Internet options -  Advanced tab
?
2, the following does not belong to the characteristics of computer viruses is ().
A, parasitism
B, destructiveness
C, infectious
D, sudden and leaky
?
3, the developer of Symbian mobile operating system is ().
A, Microsoft?
B, apple?
C, NOKIA?
D, Google?
?
4, the mainstream of information security products and services include: (a) according to different functions can be divided into network audit, audit, audit log database, were recorded on the network behavior, system operation log, database operation, can provide based on the identity of a principal (user), operation (behavior), object identification (equipment, operating system the database system and application system) analysis and audit report, provide the basis for management, and after verification.
A, virtual private network (VPN-, Virtual, Private, Network)
B, security isolation and information exchange system
C, security audit products
D, terminal security management
?
5, the counterfeiters make full use of more effective skills and automatic operation technology, with the help of hot spots and sensitive issues to enhance the credibility of phishing, the problem of phishing is still thorny. The phishing site here is...
A, phishing
B, website tampering
C, botnet
D, data leakage
?
6, QQ Zone is a ().
A, micro-blog / personal space
B, instant messenger software
C, network video service provider
D, group buying website
?
7, after enabling the IE browsers hierarchical review function, if you 
                您可能关注的文档
- (人教版)小学四年级(四舍五进)教授教化方法(国外英文资料).doc
- (人教版)初中罕见白话虚词的用法回结(国外英文资料).doc
- (优良母亲扮演的角色)(国外英文资料).doc
- (could可以看作是can的以前式(国外英文资料).doc
- (高中英语词汇教授教化)(国外英文资料).doc
- (必修)《心思学》课程功课评讲(2(国外英文资料).doc
- 003短时记忆(国外英文资料).doc
- 01言语行动实际评述(国外英文资料).doc
- 040BG-II型塑料瓶包装联动线标准操纵规程(国外英文资料).doc
- 0610GRE填空真题解析(国外英文资料).doc
- 2015翻译硕士考研英语翻译难点精析 表语从句翻译法(国外英文资料).doc
- 2015考研英语解析:搞定长难句,从断句开始(国外英文资料).doc
- 2015考研英语阅读理解精读P33—工学类(国外英文资料).doc
- 2015水利安全知识竞赛试题(含答案)(国外英文资料).doc
- 2015高考限时对点规范训练5 重要虚词译到位(国外英文资料).doc
- 2016年职称英语语法温习重点(国外英文资料).doc
- 2016江苏公事员言语理解逻辑填空高频考点:成语辨析题(国外英文资料).doc
- 2016心思学考研心思测量常识要点:效度(国外英文资料).doc
- 2016考研英语 词根+联想记忆7(国外英文资料).doc
- 2016考研英语分词作状语八种情况总结(国外英文资料).doc
 原创力文档
原创力文档 
                         
                                    

文档评论(0)