当前位置:首页计算机类软件水平考试中级网络工程师->Networksecurityistheprotection

Network security is the protection of the underlying networking infrastructure from ( )access, misuse, or theft, It involves creating a secure infrastructure for devices, users and applications to work in a ( ) manner. Network security combines multiple layers of defenses at the edge and in the network. Each network security layer implements ( ) and controls. Authorized users gain access to network resources. A ( ) is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. A virtual (作答此空) network encrypts the connection from an endpoint to a network, often over the internet. Typically a remote-access VPN uses IPsec or Secure Sockets Layer to authenticate the communication between device and network.

  • A.public
  • B.private
  • C.personal
  • D.political
查看答案 纠错
答案: B
本题解析:

网络安全是保护底层网络基础设施免受非授权访问、误用或盗窃,它涉及为设备、用户和应用程序创建一个安全的基础设施,使其以安全方式工作。网络安全结合了边缘和网络中的多层防御。每个网络安全层实现策略和控制。授权用户可以访问网络资源。防火墙是一种网络安全设备,用于监控传入和传出的网络流量,并根据定义的一组安全规则决定是否允许或阻止特定的流量专用网络通常通过internet对端点到网络的连接进行加密。通常,远程访问VPN使用IPsec或安全套接字层来验证设备和网络之间的通信。

更新时间:2022-04-29 21:17

你可能感兴趣的试题

单选题

Data security is the practice of protecting digital information from ( )access,corruption,or theft throughout its entire lifecycle. It is a concept that encompasses every aspect of information security from the ( )security of hardware and storage devices to administrative and access controls,as well as the logical security of software applications. It also includes organizational ( )and procedures.Data security involves deploying tools and technologies that enhance the organization's visibility into where its critical data resides and how it is used. These tools and technologies should ( )the growing challenges inherent in securing today's complex distributed,hybrid,and/or multicloud computing environments.Ideally,these tools should be able to apply protections like (作答此空),data masking,and redaction of sensitive files, and should automate reporting to streamline audits and adhering to regulatory requirements.

  • A.compression
  • B.encryption
  • C.decryption
  • D.translation
查看答案
单选题

Data security is the practice of protecting digital information from ( )access,corruption,or theft throughout its entire lifecycle. It is a concept that encompasses every aspect of information security from the ( )security of hardware and storage devices to administrative and access controls,as well as the logical security of software applications. It also includes organizational ( )and procedures.Data security involves deploying tools and technologies that enhance the organization's visibility into where its critical data resides and how it is used. These tools and technologies should (作答此空)the growing challenges inherent in securing today's complex distributed,hybrid,and/or multicloud computing environments.Ideally,these tools should be able to apply protections like ( ),data masking,and redaction of sensitive files, and should automate reporting to streamline audits and adhering to regulatory requirements.

  • A.address
  • B.define
  • C.ignore
  • D.pose
查看答案
单选题

Data security is the practice of protecting digital information from ( )access,corruption,or theft throughout its entire lifecycle. It is a concept that encompasses every aspect of information security from the ( )security of hardware and storage devices to administrative and access controls,as well as the logical security of software applications. It also includes organizational (作答此空)and procedures.Data security involves deploying tools and technologies that enhance the organization's visibility into where its critical data resides and how it is used. These tools and technologies should ( )the growing challenges inherent in securing today's complex distributed,hybrid,and/or multicloud computing environments.Ideally,these tools should be able to apply protections like ( ),data masking,and redaction of sensitive files, and should automate reporting to streamline audits and adhering to regulatory requirements.

  • A.behaviors
  • B.cultures
  • C.policies
  • D.structures
查看答案
单选题

Data security is the practice of protecting digital information from ( )access,corruption,or theft throughout its entire lifecycle. It is a concept that encompasses every aspect of information security from the (作答此空)security of hardware and storage devices to administrative and access controls,as well as the logical security of software applications. It also includes organizational ( )and procedures.Data security involves deploying tools and technologies that enhance the organization's visibility into where its critical data resides and how it is used. These tools and technologies should ( )the growing challenges inherent in securing today's complex distributed,hybrid,and/or multicloud computing environments.Ideally,these tools should be able to apply protections like ( ),data masking,and redaction of sensitive files, and should automate reporting to streamline audits and adhering to regulatory requirements.

  • A.logical
  • B.physical
  • C.network
  • D.Information
查看答案
单选题

Data security is the practice of protecting digital information from (作答此空)access,corruption,or theft throughout its entire lifecycle. It is a concept that encompasses every aspect of information security from the ( )security of hardware and storage devices to administrative and access controls,as well as the logical security of software applications. It also includes organizational ( )and procedures.Data security involves deploying tools and technologies that enhance the organization's visibility into where its critical data resides and how it is used. These tools and technologies should ( )the growing challenges inherent in securing today's complex distributed,hybrid,and/or multicloud computing environments.Ideally,these tools should be able to apply protections like ( ),data masking,and redaction of sensitive files, and should automate reporting to streamline audits and adhering to regulatory requirements.

  • A.unauthorizeD
  • B.authorizeD
  • C.normal
  • D.frequent
查看答案
单选题

以下关于项目风险管理的说法中,不正确的是( )。

  • A.通过风险分析可以避免风险发生,保证项目总目标的顺利实现
  • B.通过风险分析可以增强项目成本管理的准确性和现实性
  • C.通过风险分析来识别、评估和评价需求变动,并计算其对盈亏的影响
  • D.风险管理就是在风险分析的基础上拟定出各种具体的风险应对措施
查看答案
单选题

某分公司财务 PC 通过专网与总部财务系统连接,拓扑如图8所示。某天,财务PC访问总部财务系统速度缓慢、时断时好,网络管理员在财务PC端ping总部财务系统,发现有网络丢包,在光电转换器1处ping总部财务系统网络丢包症状同上,在专网接入终端处ping 总部财务系统,网络延时正常无丢包,光纤1两端测得光衰为-28dBm,光电转换器1和2指示灯绿色闪烁。 初步判断该故障原因可能是( ),可采用(作答此空)措施较为合理。

高级网络规划设计师,历年真题,2021年下半年(上午)《网络规划设计师》真题

  • A.更换财务PC终端网卡
  • B.更换双绞线1
  • C.检查光纤1链路,排除故障,降低光衰
  • D.更换光电转换器1、2
查看答案
单选题

某分公司财务 PC 通过专网与总部财务系统连接,拓扑如图8所示。某天,财务PC访问总部财务系统速度缓慢、时断时好,网络管理员在财务PC端ping总部财务系统,发现有网络丢包,在光电转换器1处ping总部财务系统网络丢包症状同上,在专网接入终端处ping 总部财务系统,网络延时正常无丢包,光纤1两端测得光衰为-28dBm,光电转换器1和2指示灯绿色闪烁。 初步判断该故障原因可能是(作答此空),可采用( )措施较为合理。

高级网络规划设计师,历年真题,2021年下半年(上午)《网络规划设计师》真题

  • A.财PC终端网卡故障
  • B.双绞线1链路故障
  • C.光纤1链路故障
  • D.光电转换器1、2故障
查看答案
单选题

某主机可以ping 通本机地址,而无法ping通网关地址,网络配置如图7所示,造成该故障的原因可能是( )。

高级网络规划设计师,历年真题,2021年下半年(上午)《网络规划设计师》真题

  • A.该主机的地址是广播地址
  • B.默认网关地址不属于该主机所在的子网
  • C.该主机的地址是组播地址
  • D.默认网关地址是组播地址
查看答案
单选题

下列命令片段用于配置( )功能。

高级网络规划设计师,历年真题,2021年下半年(上午)《网络规划设计师》真题

  • A.环路检测
  • B.流量抑制
  • C.报文检查
  • D.端口镜像
查看答案