首页
试卷库
试题库
当前位置:
X题卡
>
所有题目
>
题目详情
在容错计算机中采用冗余技术来提高系统的可靠性和可用性,这些冗余技术不包括______。
查看本题答案
包含此试题的试卷
高级系统分析师《单选集》真题及答案
点击查看
你可能感兴趣的试题
为实现计算机联锁控制系统的故障安全传输下面说法正确的是
首先,采用避错技术和冗余技术提高安全信息通信网络的可靠性
并尽可能检出传输设备和传输通路所发生的传输错误
采取软件和硬件容错技术措施,确保在传输设备故障或传输通路的噪声使传输的信息发生错误的情况下,确保通信信息的安全性D采用质量较好的传输元件
论高可靠性系统中软件容错技术的应用 容错技术是当前计算机领域研究的热点之一是提高整个系统
RAID是一种提高键盘存储速度容量和可靠性的技术下面有关RAID的叙述中错误的是______
RAID的中文名称是磁盘冗余阵列
条块技术可以提高磁盘存储器的传输性能
为了提高可靠性,RAID中采用了镜像冗余技术和校验冗余技术
RAID只能用SCSI磁盘驱动器来实现
容错计算机的主要设计目标是为了提高计算机系统的可靠性和1提高计算机可靠性的技术可以分为2和3后
稳定性
可用性
可修改性
可移植性
在计算机联锁系统中为了提高进路控制过程的可靠性对于涉及进路控制的计算机一般采用了
避错技术
屏蔽技术
切换技术
容错技术
论高可靠性系统中软件容错技术的应用 容错技术是当前计算机领域研究的热点之一是提高整个系统
试题四分布式存储系统DistributedStorageSystem通常将数据分散存储在多__
计算机联锁双机储备系统它的特点是硬件方面采用技术来提高整个系统的可靠性
工控性
动态冗余
“M+1”冗余
“Z+1”冗余
容错计算机的主要设计目标是为了提高计算机系统的可靠性和1提高计算机可靠性的技术可以分为2和3后
避错技术
流水线技术
容错技术
校验技术
对于计算机系统的容错能力下列说法正确的是______
容错是允许错误发生
容错是允许故障存在
容错能力也就是可靠性
容错能力是可用性
容错计算机中采用冗余技术来提高系统的可靠性和可用性这些冗余技术包括
硬件冗余
信息冗余
时间冗余
人员沉余
对于计算机系统的容错能力下列说法正确的是12
容错就是允许错误发生
容错是允许故障存在
容错能力也就是可靠性
容错能力是可用性
容错计算机的主要设计目标是为了提高计算机系统的可靠性和
稳定性
可用性
可修改性
可移植性
容错计算机的主要设计目标是为了提高计算机系统的可靠性和1提高计算机可靠性的技术可以分为2和3后
避错技术
流水线技术
容错技术
校验技术
论高可靠性系统中软件容错技术的应用 容错技术是当前计算机领域研究的热点之一是提高整个系统
容错计算机的主要设计目标是为了提高计算机系统的可靠性和1提高计算机可靠性的技术可以分为2和3后
数据冗余、软件冗余、时间冗余、空间冗余
软件冗余、数据冗余、时间冗余、空间冗余
硬件冗余、数据冗余、软件冗余、信息冗余
硬件冗余、软件冗余、时间冗余、信息冗余
RAID是一种提高磁盘存储速度容量和可靠性的技术下面有关RAID的叙述中错误的是______
RAID的中文名称是磁盘冗余阵列
RAID只能用SCSI磁盘驱动器来实现
为了提高可靠性,RAID中采用了镜像冗余技术和校验冗余技术
条块技术可以提高磁盘存储器的传输性能
容错计算机中采用冗余技术来提高系统的可靠性和可用性这些冗余技术不包括16
硬件冗余
信息冗余
时间冗余
人员冗余
提高计算机可靠性可以采用冗余技术下面的例子中属于信息冗余的是______
软件备份
CRC校验
程序卷回
指令复执
热门试题
更多
某公司为便于员工在家里访问公司的一些数据允许员工通过Internet访问公司的FTP服务器如图2-2所示为了能够方便地实现这一目标决定在客户机与FTP服务器之间采用1协议在传输层对数据进行加密该协议是一个保证计算机通信安全的协议客户机与服务器之间协商相互认可的密码发生在2[*]
astuteserviceprovidersrealizethatthecontinuedsupportoflegacyX.25andasynchronousnetworkelementusingseparateoperationsnetworkiscost141.Forexamplethemaintenanceofmultiplenetworkscanrequireadditionalstaff.Oftenthisstaffmustbetrainedonmultiplevendortechnologiessometimesrequiringparallelgroupsspecializingineach142.Henceadditionalmaintenanceproceduresmustbemaintainedandadministrativerecordsare143.Theduplicationoftransportfacilitiestocarry144networktrafficisaninefficientuseofresources.Andnotsurprisinglymoretechnologiesinstalledinacentralofficemeansthenecessityformorephysicalspaceandanincreaseinpowerconnectionsandpowerconsumptionmigrationofthese145networkelementstoIP-basedDCnsisalogicalstrategy.
WLANsareincreasinglypopularbecausetheyenablecost-effectiveconnectionsamongpeopleapplicationsanddatathatwerenotpossibleornotcost-effectiveinthepast.ForexampleWLAN-basedapplicationscanenablefine-grainedmanagementofsupplyanddistribution166toimprovetheirefficientyandreduce167.WLANscanalsoenableentirelynewbusinessprocesses.TocitebutoneexamplehospitalsareusingWLAN-enabledpoint-of-careapplicationstoreduceerrorsandimproveoverall168care.WLANmanagementsolutionsprovideavarietyofotherbenefitsthatcanbesubstantialbutdifficulttomeasure.Forexampletheycanprotectcorporatedatabypreventing169throughrogueaccesspoints.TheyhelpcontrolsalarycostsbyallowingITstaffstomanagelargernetworkswithoutaddingstaff.Andtheycanimproveoverallnetworkmananementbyintegratingwithcustomers’existingsystemssuchasOpenViewandUniCenter.Fortunatelyitisn’tnecessarytomeasurethesebenefitstojustifyinvestinginWLANmanagementsolutionswhichcanquicklypayforthemselvessimplybyminimizingtime-consuming170andadministrativechores.
WLANsareincreasinglypopularbecausetheyenablecost-effectiveconnectionsamongpeopleapplicationsanddatathatwerenotpossibleornotcost-effectiveinthepast.ForexampleWLAN-basedapplicationscanenablefine-grainedmanagementofsupplyanddistribution166toimprovetheirefficientyandreduce167.WLANscanalsoenableentirelynewbusinessprocesses.TocitebutoneexamplehospitalsareusingWLAN-enabledpoint-of-careapplicationstoreduceerrorsandimproveoverall168care.WLANmanagementsolutionsprovideavarietyofotherbenefitsthatcanbesubstantialbutdifficulttomeasure.Forexampletheycanprotectcorporatedatabypreventing169throughrogueaccesspoints.TheyhelpcontrolsalarycostsbyallowingITstaffstomanagelargernetworkswithoutaddingstaff.Andtheycanimproveoverallnetworkmananementbyintegratingwithcustomers’existingsystemssuchasOpenViewandUniCenter.Fortunatelyitisn’tnecessarytomeasurethesebenefitstojustifyinvestinginWLANmanagementsolutionswhichcanquicklypayforthemselvessimplybyminimizingtime-consuming170andadministrativechores.
Tocompeteintoday’sfast-pacedcompetitiveenvironmentorganizationsareincreasinglyallowingcontractorspartnersvisitorsandgueststoaccesstheirinternalenterprisenetworks.Theseusersmayconnecttothenetworkthroughwiredportsinconferenceroomsorofficesorviawirelessaccesspoints.InallowingthisopenaccessforthirdpartiesLANsbecome171.Thirdpartiescanintroduceriskinavarietyofwaysfromconnectingwithaninfectedlaptoptounauthorizedaccessofnetworkresourcesto172activity.Formanyorganizationshowevertheoperationalcomplexityandcoststoensuresafethirdpartynetworkaccesshavebeenprohibitive.Fifty-twopercentofsurveyedCISOsstatethattheycurrentlyuseamoatandcastle’ssecurityapproachandadmitthatdefensesinsidetheperimeterareweak.Threatsfrominternalusersarealsoincreasinglyacauseforsecurityconcerns.Employeeswithmaliciousintentcanlaunch173ofserviceattacksorsteal174informationbysnoopingthenetwork.Astheyaccessthecorporatenetworkmobileandremoteusersinadvertentlycaninfectthenetworkwith175andwormsacquiredfromunprotectedpublicnetworks.Hackersmasqueradingasinternaluserscantakeadvantageofweakinternalsecuritytogainaccesstoconfidentialinformation.
Tocompeteintoday’sfast-pacedcompetitiveenvironmentorganizationsareincreasinglyallowingcontractorspartnersvisitorsandgueststoaccesstheirinternalenterprisenetworks.Theseusersmayconnecttothenetworkthroughwiredportsinconferenceroomsorofficesorviawirelessaccesspoints.InallowingthisopenaccessforthirdpartiesLANsbecome171.Thirdpartiescanintroduceriskinavarietyofwaysfromconnectingwithaninfectedlaptoptounauthorizedaccessofnetworkresourcesto172activity.Formanyorganizationshowevertheoperationalcomplexityandcoststoensuresafethirdpartynetworkaccesshavebeenprohibitive.Fifty-twopercentofsurveyedCISOsstatethattheycurrentlyuseamoatandcastle’ssecurityapproachandadmitthatdefensesinsidetheperimeterareweak.Threatsfrominternalusersarealsoincreasinglyacauseforsecurityconcerns.Employeeswithmaliciousintentcanlaunch173ofserviceattacksorsteal174informationbysnoopingthenetwork.Astheyaccessthecorporatenetworkmobileandremoteusersinadvertentlycaninfectthenetworkwith175andwormsacquiredfromunprotectedpublicnetworks.Hackersmasqueradingasinternaluserscantakeadvantageofweakinternalsecuritytogainaccesstoconfidentialinformation.
SOXisanalternative156forXML.ItisusefulforreadingandcreatingXMLcontentina157editor.ItistheneasilytransformedintoproperXML.SOXwascreatedbecausedeveloperscanspendagreatdealoftimewithrawXML.FormanyofusthepopularXML158havenotreachedapointwheretheirtreeviewstablesandformscancompletelysubstitutefortheunderlying159language.ThisisnotsurprisingwhenoneconsidersthatdevelopersstilluseatextviewalbeitenhancedforeditingotherlanguagessuchasJava.SOXuses160torepresentthestructureofanXMLdocumentwhicheliminatestheneedforclosingtagsandanumberofquotingdevices.Theresultissurprisinglyclear.
在密码学中单向Hash函数具有______所描述的特性
Microsoft’sCOMisasoftware146thatallowsapplicationstobebuiltfrombinarysoftwarecomponents.COMistheunderlyingarchitecturethatformsthefoundationforhigher-levelsoftwareserviceslikethoseprovidedbyOLE.COMdefinesabinarystandardforfunctioncallingbetweencomponentsawayforcomponentstodynamicallydiscovertheinterfacesimplementedbyothercomponentsandamechanismtoidentifycomponentsandtheirinterfacesuniquely.OLEisacompound147standarddevelopedbyMicrosoft.OLEmakesitpossibletocreate148withoneapplicationandlinkorembedtheminasecondapplication.Embeddedobjectsretaintheiroriginalformatand149totheapplicationthatcreatedthem.SupportforOLEisbuiltintotheWindowsandMacOSOperatingSystems.A150compounddocumentstandarddevelopedmainlybyAppleandIBMiscalledOpenDoc.
VRMLisa151for3DmultimediaandsharedvirtualworldsontheWWW.IncomparisontoHTMLVRMLaddsthenextlevelofinteractionstructuredgraphicsandextra152zandtimetothepresentationofdocuments.TheapplicationsofVRMLare153rangingfromsimplebusinessgraphicstoentertainingWWWpagegraphicsmanufacturingscientificentertainmentandeducationalapplicationsand3Dsharedvirtualworldsandcommunities.X3DisthenameunderwhichthedevelopmentofVRMLiscontinued.X3DisbasedonXMLandisbackwards154withVRML.FurthermoreitiscomponentizedprofiledandextensiblewhichmakesitpossibletouseX3Dinverydifferent155fromhigh-endvisualizationstolightweightapplications.
______不属于将入侵检测系统部署在DMZ中的优点
以下关于RSA加密算法的说法中错误的是______
为了保障数据的存储和传输安全需要对一些重要数据进行加密由于对称密码算法11所以特别适合对大量的数据进行加密国际数据加密算法IDEA的密钥长度是12位
用于在网络应用层和传输层之间提供加密方案的协议是______
许多黑客利用缓冲区溢出漏洞进行攻击对于这一威胁最可靠的解决方案是______
Tocompeteintoday’sfast-pacedcompetitiveenvironmentorganizationsareincreasinglyallowingcontractorspartnersvisitorsandgueststoaccesstheirinternalenterprisenetworks.Theseusersmayconnecttothenetworkthroughwiredportsinconferenceroomsorofficesorviawirelessaccesspoints.InallowingthisopenaccessforthirdpartiesLANsbecome171.Thirdpartiescanintroduceriskinavarietyofwaysfromconnectingwithaninfectedlaptoptounauthorizedaccessofnetworkresourcesto172activity.Formanyorganizationshowevertheoperationalcomplexityandcoststoensuresafethirdpartynetworkaccesshavebeenprohibitive.Fifty-twopercentofsurveyedCISOsstatethattheycurrentlyuseamoatandcastle’ssecurityapproachandadmitthatdefensesinsidetheperimeterareweak.Threatsfrominternalusersarealsoincreasinglyacauseforsecurityconcerns.Employeeswithmaliciousintentcanlaunch173ofserviceattacksorsteal174informationbysnoopingthenetwork.Astheyaccessthecorporatenetworkmobileandremoteusersinadvertentlycaninfectthenetworkwith175andwormsacquiredfromunprotectedpublicnetworks.Hackersmasqueradingasinternaluserscantakeadvantageofweakinternalsecuritytogainaccesstoconfidentialinformation.
VRMLisa151for3DmultimediaandsharedvirtualworldsontheWWW.IncomparisontoHTMLVRMLaddsthenextlevelofinteractionstructuredgraphicsandextra152zandtimetothepresentationofdocuments.TheapplicationsofVRMLare153rangingfromsimplebusinessgraphicstoentertainingWWWpagegraphicsmanufacturingscientificentertainmentandeducationalapplicationsand3Dsharedvirtualworldsandcommunities.X3DisthenameunderwhichthedevelopmentofVRMLiscontinued.X3DisbasedonXMLandisbackwards154withVRML.FurthermoreitiscomponentizedprofiledandextensiblewhichmakesitpossibletouseX3Dinverydifferent155fromhigh-endvisualizationstolightweightapplications.
由L2TPv2构建的VPN网络中主要由LAC和LNS两种网络设备构成以下说法错误的是______
网络安全设计是保证网络安全运行的基础网络安全设计有其基本的设计原则以下关于网络安全设计原则的描述错误的是______
采用Kerberos系统进行认证时可以在报文中加入______来防止重放攻击
Withhundredsofmillionsofelectronic161takingplacedailybusinessesandorganizationshaveastrongincentivetoprotectthe162ofthedataexchangedinthismannerandtopositivelyensurethe163ofthoseinvolvedinthetransactions.Thishasledtoanindustry-widequestforbettermoresecuremethodsforcontrollingIToperationsandfordeployingstrongsecuritymechanismsdeeplyandbroadlythroughoutnetworkedinfrastructuresandclientdevices.Oneofthemoresuccessfulconceptstoengagetheimaginationsofthesecuritycommunityhasbeenthedevelopmentofstandards-basedsecurity164thatcanbeincorporatedinthehardwaredesignofclientcomputers.Theprincipleofencapsulatingcoresecuritycapabilitiesin165andintegratingsecurityprovisionsatthedeepestlevelsofthemachineoperationhassignificantbenefitsforbothusersandthoseresponsibleforsecuringIToperations.
3DES在DES的基础上使用两个56位的密钥K1和K2发送方用K1加密K2解密再用K1加密接受方用K1解密K2加密再用K1解密这相当于使用______倍于DES的密钥长度的加密效果
数字信封______
Microsoft’sCOMisasoftware146thatallowsapplicationstobebuiltfrombinarysoftwarecomponents.COMistheunderlyingarchitecturethatformsthefoundationforhigher-levelsoftwareserviceslikethoseprovidedbyOLE.COMdefinesabinarystandardforfunctioncallingbetweencomponentsawayforcomponentstodynamicallydiscovertheinterfacesimplementedbyothercomponentsandamechanismtoidentifycomponentsandtheirinterfacesuniquely.OLEisacompound147standarddevelopedbyMicrosoft.OLEmakesitpossibletocreate148withoneapplicationandlinkorembedtheminasecondapplication.Embeddedobjectsretaintheiroriginalformatand149totheapplicationthatcreatedthem.SupportforOLEisbuiltintotheWindowsandMacOSOperatingSystems.A150compounddocumentstandarddevelopedmainlybyAppleandIBMiscalledOpenDoc.
图2-6示意了发送者利用非对称加密算法向接收者传送消息的过程图中a和b处分别是______[*]
SOXisanalternative156forXML.ItisusefulforreadingandcreatingXMLcontentina157editor.ItistheneasilytransformedintoproperXML.SOXwascreatedbecausedeveloperscanspendagreatdealoftimewithrawXML.FormanyofusthepopularXML158havenotreachedapointwheretheirtreeviewstablesandformscancompletelysubstitutefortheunderlying159language.ThisisnotsurprisingwhenoneconsidersthatdevelopersstilluseatextviewalbeitenhancedforeditingotherlanguagessuchasJava.SOXuses160torepresentthestructureofanXMLdocumentwhicheliminatestheneedforclosingtagsandanumberofquotingdevices.Theresultissurprisinglyclear.
IPSec提供了在局域网广域网和互联网中安全通信的能力以下关于IPSec说法错误的是______
Withhundredsofmillionsofelectronic161takingplacedailybusinessesandorganizationshaveastrongincentivetoprotectthe162ofthedataexchangedinthismannerandtopositivelyensurethe163ofthoseinvolvedinthetransactions.Thishasledtoanindustry-widequestforbettermoresecuremethodsforcontrollingIToperationsandfordeployingstrongsecuritymechanismsdeeplyandbroadlythroughoutnetworkedinfrastructuresandclientdevices.Oneofthemoresuccessfulconceptstoengagetheimaginationsofthesecuritycommunityhasbeenthedevelopmentofstandards-basedsecurity164thatcanbeincorporatedinthehardwaredesignofclientcomputers.Theprincipleofencapsulatingcoresecuritycapabilitiesin165andintegratingsecurityprovisionsatthedeepestlevelsofthemachineoperationhassignificantbenefitsforbothusersandthoseresponsibleforsecuringIToperations.
Withhundredsofmillionsofelectronic161takingplacedailybusinessesandorganizationshaveastrongincentivetoprotectthe162ofthedataexchangedinthismannerandtopositivelyensurethe163ofthoseinvolvedinthetransactions.Thishasledtoanindustry-widequestforbettermoresecuremethodsforcontrollingIToperationsandfordeployingstrongsecuritymechanismsdeeplyandbroadlythroughoutnetworkedinfrastructuresandclientdevices.Oneofthemoresuccessfulconceptstoengagetheimaginationsofthesecuritycommunityhasbeenthedevelopmentofstandards-basedsecurity164thatcanbeincorporatedinthehardwaredesignofclientcomputers.Theprincipleofencapsulatingcoresecuritycapabilitiesin165andintegratingsecurityprovisionsatthedeepestlevelsofthemachineoperationhassignificantbenefitsforbothusersandthoseresponsibleforsecuringIToperations.
VRMLisa151for3DmultimediaandsharedvirtualworldsontheWWW.IncomparisontoHTMLVRMLaddsthenextlevelofinteractionstructuredgraphicsandextra152zandtimetothepresentationofdocuments.TheapplicationsofVRMLare153rangingfromsimplebusinessgraphicstoentertainingWWWpagegraphicsmanufacturingscientificentertainmentandeducationalapplicationsand3Dsharedvirtualworldsandcommunities.X3DisthenameunderwhichthedevelopmentofVRMLiscontinued.X3DisbasedonXMLandisbackwards154withVRML.FurthermoreitiscomponentizedprofiledandextensiblewhichmakesitpossibletouseX3Dinverydifferent155fromhigh-endvisualizationstolightweightapplications.
热门题库
更多
高级系统分析师
高级网络规划设计师
高级系统架构师
中级信息系统监理师
初级通信工程师
中级通信工程师
通信新技术、新业务知识
无线通信专业技术
移动通信专业技术
有线传输专业技术
电话交换专业技术
电信网络专业技术
计算机通信专业技术
通信电源专业技术
电信营销专业技术
网络优化考试