刷题
导入试题
【单选题】
网络空间安全的技术架构有哪些?___
A. 物理安全、密码保护、数据分析、端口安全
B. 物理安全、隐私保护、舆情分析、应用安全
C. 网络安全、隐私保护、数据分析、应用安全
D. 物理安全、密码保护、舆情分析、端口安全
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
B
解析
暂无解析
相关试题
【单选题】
选出下列不是我国网络空间安全面临的严峻挑战。___
A. 信息传播渠道不断扩展
B. 网络有害信息侵蚀文化安全
C. 网络恐怖和违法犯罪破坏社会安全
D. 网络空间机遇和挑战并存
【单选题】
习近平主席曾指出:没有网络安全,就没有国家安全。___
A. 没有信息化,就没有现代化
B. 没有数据化,就没有时代化
C. 没有网络隐私,就没有国家隐私
D. 没有网络发展,就没有国家发展
【单选题】
下列不是我国在发展网络空间安全时面临的问题是?___
A. 攻击的高级性
B. 渠道的拓展性
C. 威胁的多元性
D. 危害的倍增性
【单选题】
下列不属于工作中常见的网络安全问题是___
A. 网络设备面临的威胁
B. 操作系统面临的威胁
C. 忽视备份面临的威胁
D. 应用程序面临的威胁
【单选题】
网络安全的解释可以是___
A. 运行系统安全
B. 网络上系统信息的安全
C. 网络上信息传播的安全
D. 以上都是
【单选题】
计算机网络安全的目标不包括___
A. 保密性
B. 完整性
C. 可移植性
D. 可用性
【单选题】
网络安全法正式开始实施的时间是?___
A. 2016年11月7日
B. 2017年6月1日
C. 2016年6月1日
D. 2017年11月7日
【单选题】
信息系统中的脆弱性不包括。___
A. 网络谣言
B. 物理安全
C. 操作系统
D. TCP/IP网络协议
【单选题】
应对网络攻击的常用防护措施有___
A. 采用访问控制措施
B. 运行数据加密措施
C. 数据备份与恢复
D. 以上都是
【单选题】
网络远程攻击分为哪几个阶段?___
A. 准备、隐藏、实施
B. 准备、实施、隐藏
C. 破解、隐藏、实施
D. 破解、实施、隐藏
【单选题】
对信息系统的基本威胁不包括___
A. 信息泄露
B. 完整性破坏
C. 网络谣言
D. 未授权访问
【单选题】
有些计算机的安全性不高,不对用户进行验证,这类系统的安全级别是?___
A. A1
B. D1
C. C1
D. C2
【单选题】
物理安全的内容包括哪些?___
A. 网络协议与安全、网络安全与管理
B. 物理坏境安全、物理设备管理
C. OS与虚拟化安全、移动终端安全
D. 恶意代码防范、数据库、中间件与Web安全
【单选题】
下列不属于对称加密的是___
A. IDEA
B. 三重DES
C. RSA算法
D. Rivest Cipher5
【单选题】
以下选项哪个是工作中常见的网络安全问题。___
A. 企业数据库被攻击
B. 支付宝账号被盗
C. QQ账号密码被盗
D. 银行卡被盗刷
【单选题】
我国网络安全面临的严峻挑战是___
A. 网络是信息传播的新渠道
B. 网络是生产生活的新空间
C. 网络空间的国际竞争方兴未艾
D. 网络是经济发展的新引擎
【单选题】
我国网络安全面临的重大机遇有哪些?___
A. 网络有害信息侵蚀文化
B. 网络是信息传播的新渠道
C. 网络恐怖和违法犯罪破坏社会安全
D. 网络渗透危害政治安全
【单选题】
数据安全包括哪些内容?___
A. 数据库安全、移动终端安全
B. 数据安全的范畴、数据的保密性
C. 大数据安全、云安全
D. Web安全、物联网安全
【单选题】
黑客一旦攻陷()那么就掌握了控制内部网络访问外部网络的权利___
A. CPU
B. 内存
C.  路由器
D. 外存
【单选题】
信息安全经历了三个发展阶段,以下不属于这三个发展阶段的是。___
A. 加密机阶段
B. 通信保密阶段
C. 信息安全阶段
D. 安全保障阶段
【单选题】
在需要保护的信息资产中()是最重要的。___
A. 数据
B. 硬件
C. 环境
D. 软件
【单选题】
计算机信息系统安全的三个相辅相成、互补互通的有机组成部分是___
A. 安全法规
B. 安全技术
C. 安全管理
D. 以上都是
【单选题】
下列的()犯罪行为不属于我国刑法规定的与计算机有关的犯罪行为。___
A. 窃取国家机密
B. 非法侵入机损及信息系统
C. 破坏计算机信息系统
D. 利用机损及实施金融诈骗
【单选题】
根据ISO定义,信息安全的目标就是保证信息资产的三个基本安全属性,包括___
A. 保密性
B. 完整性
C. 可用性
D. 以上都是
【单选题】
信息系统常见的危险有___
A. 软硬件设计故障导致网络瘫痪
B. 黑客入侵
C. 信息删除
D. 以上都是
【单选题】
自动探测软件时时在寻找___
A. 大型企业
B. 政府部门
C. 学术机构
D. 以上都是
【单选题】
系统和网络对一个国家来说非常重要,一旦失灵或被摧毁,将威胁到___
A. 国家安全
B. 国民经济
C. 公共健康和安全
D. 以上都是
【单选题】
()的数字技术得到广泛传播,被依赖程度越来越高,在网络安全方面形成很大隐患。___
A. 软件密集型
B. 数字密集型
C. 学术密集型
D. 技术密集型
【单选题】
传统网络防御方法能应付小打小闹的攻击,理想情况下也许能阻挡百分之几的的入侵?___
A. 90%
B. 95%
C. 80%
D. 60%
【单选题】
安全系统逐渐从没有通信能力的模拟机械设备,进化为___
A. 信息文化平台
B. 学术密集平台
C. 软件数字平台
D. 时间需求平台
【单选题】
防范入侵最好的方法是___
A. 建立化工厂
B. 建立核电站
C. 建立网络安全文化
D. 建立网页封闭
【单选题】
新防御思路的目标是?___
A. 增加关键部门对数字技术的依赖
B. 减少或消除关键部门对数字技术的依赖
C. 消除关键部门对数字技术的依赖
D. 减少关键部门对数字技术的依赖
【单选题】
物理安全的范围是以下哪个选项___
A. 环境安全
B. 设备安全
C. 介质安全
D. 以上都是
【单选题】
以下哪个选项不是PC网络物理安全隔离卡的功能。___
A. 只可以用于连接外部网
B. 能把一台普通计算机分成两或三台虚拟计算机
C. 能实现安全环境和不安全环境的绝对隔离
D. 保护用户的机密数据和信息免受黑客的威胁和攻击
【单选题】
以下哪个选项不属于安全硬件?___
A. PC网络物理安全隔离卡
B. 安全芯片
C. 网络安全物理隔离器
D. 物理隔离网闸
【单选题】
安全芯片配合专用软件可以实现的功能不包括哪一项___
A. 存储,管理密码
B. 加密
C. 安全认证
D. 对加密硬盘进行分区
【单选题】
在计算机房,主要的防火措施有几种。___
A. 4
B. 3
C. 2
D. 1
【单选题】
下列哪项是雷击时的防毁措施___
A. 接闪,接地
B. 分流
C. 屏蔽
D. 以上都是
【单选题】
在电磁干扰环境中工作,对计算机造成的严重影响不包括下列哪项?___
A. ,安全性
B. 灵活性
C. 稳定性
D. 可靠性
【单选题】
计算机面临最大威胁是___
A. 操作员安全配置不当
B. 用户安全意识不强
C. 人为的恶意攻击
D. 账号共享
推荐试题
【多选题】
Which two situations could cause a virtual machine to appear with (orphaned) appended to its name? (Choose two.)___
A. if a host failover is unsuccessful
B. if a virtual machine was removed from vCenter Server's inventory
C. if a virtual machine was deployed from template, and the template has been deleted
D. if a virtual machine is unregistered directly on the host
【多选题】
Which three requirements are needed to apply RAID 5 or RAID 6 erasure coding on a vSAN 6.2 or 6.5 object? (Choose three.)___
A. on Disk Format 3.0
B. Hybrid vSAN
C. All Flash vSAN
D. vSAN Advanced License
E. Stretched Cluster Configurations
【多选题】
An administrator sees the following error in the log files: Which two events could be the source of the error message? (Choose two.)___
A. vCenter Server failure
B. VXLAN failure
C. Disk array failure
D. Network failure
E. ESXi host failure
【多选题】
An administrator is attempting to access an ESXi host via the DCUI but is unable to do so. Which could be two possible causes? (Choose two.)___
A. The host in Qhas no out-of-band management capability (i.e. iLO/iDRAC).
B. The SSH service is disabled on the host.
C. Strict lockdown mode is enabled on the host.
D. Normal lockdown mode is enabled and the administrator is a member of the
E. xception User list.
【多选题】
Which two permissions are required to migrate a virtual machine with Storage vMotion? (Choose two.)___
A. Network > Move Network
B. Virtual Machine > Inventory > Move
C. Resource > Migrate powered on virtual machine
D. Datastore > Allocate Space
【多选题】
Which are three supported storage requirements for vCenter Server HA? (Choose three.)___
A. NFS
B. RDM
C. vSAN
D. VMFS
E. JBOD
【多选题】
Which are the two network requirements for a VMware vSAN 6.5 cluster? (Choose two.)___
A. Multicast must be enabled on the physical switches and routers that handle vSAN traffic.
B. vSAN requires IPv6 only.
C. All hosts must have a dedicated 40GbE NIC.
D. The vSAN network supported IPv4 or IPv6.
E. vSAN requires IPv4 only.
【多选题】
Which three prerequisites must be in place prior to enabling secure boot for a virtual machine? (Choose three.)___
A. VirtualMachine.Config.Settings privileges
B. an encrypted USB drive
C. Virtual Hardware version 13 or later
D. Virtual Hardware version 12 or later
E. EFI firmware
【多选题】
A user is given the "Virtual machine user (sample)" role in a vSphere 6.x environment. Which three permissions would the user be able to perform? (Choose three.)___
A. Reset a virtual machine.
B. Power on a virtual machine.
C. Move a host into a cluster.
D. Configure CD media.
E. Migrate a virtual machine with Storage vMotion.
【多选题】
Which three are supported upgrade processes for ESXi host? (Choose three.)___
A. using vSphere Auto Deploy
B. using a TFTP server
C. using Update Manager
D. using an
E. SXCLI command
【多选题】
When enabling Storage DRS on a datastore cluster, which three components are enabled as a result? (Choose three.)___
A. Space load balancing among datastore within the datastore cluster.
B. Initial placement for virtual disks based on space and I/O workload.
C. I/O load balancing among datastores within the datastore cluster.
D. Queue Depth alerting on disks within the datastore cluster.
E. Data de-duplication within the datastore cluster.
【多选题】
What are two features introduced in Network I/O Control version 3? (Choose two.)___
A. Bandwidth reservation per traffic type
B. Network resource pools
C. CoS tagging
D. Bandwidth guarantee to virtual machines
【多选题】
Which two correct virtual machine advanced configuration parameters will accomplish this? (Choose two.)___
A. isolation.device.edit.disable = “FALSE”
B. isolation.device.edit.disable = “TRUE”
C. isolation.device.connectable.disable = “FALSE”
D. isolation.device.connectable.disable = “TRUE”
【多选题】
Which three statements are correct regarding booting an ESXi Host from Fibre Channel SAN? (Choose three.)___
A. Direct connect topology is supported.
B. Each host must have its own boot LUN.
C. ESXi hosts do not require local storage.
D. Multipathing to a boot LUN on an active-passive array is supported.
E. Hosts can share one common boot LUN.
【多选题】
Which two tasks should a vSphere administrator perform if the vmkernel log reports VMFS metadata errors? (Choose two.)___
A. contact VMware technical support
B. reformat the datastore
C. check the device with VOMA
D. ignore the messages
【多选题】
Which two statements are true for a vCenterServer user account that is used for vSphere Data Protection (VDP)? (Choose two.)___
A. The user account must be assigned with Administrator role.
B. The password for the user account cannot contain spaces.
C. The user account should be created in the Single Sign-On domain
D. The user account cannot inherit required permissions from a group role.
【多选题】
Which three storage protocols are supported by Virtual Volumes? (Choose three.)___
A. FCIP
B. FCoE
C. iSCSI
D. NFS v3
E. NFS v4
【多选题】
A vSphere administrator observes a CPU spike on one of the web servers (view the Exhibit.) Which two statements can describe the cause of this activity? (Choose two.)___
A. The network packet size is too large.
B. VMware Tools is not installed.
C. Disk latency is present on the datastore.
D. The network packet size is too small.
【多选题】
Which three operations can cause VMFS metadata updates? (Choose three.)___
A. Restarting a VM using the guest OS.
B. Launching a VM console.
C. Migrating a VM with vMotion.
D. Powering a VM on or off.
E. Expanding a VMFS datastore.
【多选题】
*What two services run on all nodes in a vCenter Server HA cluster? (Choose two.)___
A. vmware-vmon
B. vmware-vpostgres
C. vmare-rbd-watchdog
D. vmware-vcha
【多选题】
Which two statements are true regarding Auto Deploy in version 6.5? (Choose two.)___
A. Auto Deploy can be configured and managed via PowerCLI.
B. Auto Deploy can be configured and managed via the vSphere Client.
C. Auto
D. eploy can be configured and managed via the vSphere Web Client.
【多选题】
What three options can improve network performance for a virtual machine? (Choose three.)___
A. MLD
B. TSO
C. NetFlow
D. LRO
E. SR-IOV
【多选题】
Which two storage technologies are supported for MSCS? (Choose two.)___
A. NFS
B. VAAI
C. iSCSI
D. FC
【多选题】
When upgrading a VMware vSAN cluster to version 6.5, which two tasks must be completed to comply with upgrade requirements and VMware-recommended best practices? (Choose two.)___
A. Use RVC to upgrade the hosts.
B. Use the latest available ESXi version.
C. Back up all VMs.
D. Use only the “Full data migration” maintenance mode option.
【多选题】
What two enhancements are in VMFS6 but not in VMFS5? (Choose two.)___
A. Support for 4k native disks
B. Support for 512e disks
C. GPT storage device partitioning
D. Automatic space reclamation
【多选题】
Which two statements describe why a vSphere DRS cluster would report load imbalance? (Choose two.)___
A. The configured migration threshold is too high.
B. The configured migration threshold is too low.
C. DRS is configured for Partially Automated.
D. Enhanced vMotion Compatibility (EVC) is enabled.
【多选题】
A vSphere Administrator must ensure that vCenter Server service is running in a domain user account rather than Local System Account. To accomplish this, the user account should have which two permissions? (Choose two.)___
A. Log on as a service.
B. Act as part of the operating system.
C. Log on as a batch job.
D. Log on locally.
【多选题】
A virtual machine fails to power on after being deployed from a template. What two remediation steps could correct this issue? (Choose two.)___
A. Increase CPU reservation
B. Decrease memory reservation
C. Increase memory reservation
D. Increase datastore capacity
E. Decrease CPU reservation
【多选题】
Which three directories are available under the vcsa-cli-installer folder of the vCenter Server Appliance installation media? (Choose three.)___
A. \mac
B. \ovftool
C. \migration-assistant
D. \win32
E. \lin64
【多选题】
What are three considerations when booting ESXihost from SAN software FCoE? (Choose three.)___
A. The VMware_FCoE_vSwitch that the installer automatically created cannot be changed.
B. Boot LUN cannot be shared with other hosts even on shared storage.
C. Multipathing is not supported at pre-boot.
D. Software FCoE boot configuration cannot be changed from within
E. SXi.
【多选题】
Which two choices are applicable to vSphere Availability? (Choose two.)___
A. Heartbeat Datastores
B. VM Startup/Shutdoown
C. Power Management
D. Admission Control
【多选题】
A user is a member of groups A and B. -VM10 and VM20 are in VM Folder. -Group A is assigned permission “Read-only” on VM Folder. What two configurations will allow the user to edit the settings for only VM10? (Choose two.)___
A. Assign group B permission “virtual machine power user” to VM10.
B. Assign group B permission “virtual machine console user” to VM10.
C. Assign group A permission “virtual machine console user” to VM10.
D. Assign group A permission “virtual machine power user” to VM10.
【多选题】
Which two new vSphere 6.5 features enable an Administrator to locate configuration options when creating or editing host profiles more easily than in previous versions? (Choose two.)___
A. Add the configuration option to favorites.
B. Navigate the option tree.
C. Search for the configuration option.
D. Copy the configuration option from a different profile.
【多选题】
What are the two valid storage controller types for VMs on ESXi 6.5? (Choose two.)___
A. FCoE
B. SATA
C. NVMe
D. iSCSI
【多选题】
Which two options can optimize conversion with VMware Converter? (Choose two.)___
A. Disable real-time antivirus scanners.
B. Remove the source from Active Directory.
C. Remove third-party device drivers.
D. Exclude diagnostic partitions from conversion.
E. Disable Volume Shadow Copy (VSS).
【多选题】
vSphere Availability considers which two factors for virtual machine restarts? (Choose two.)___
A. Host Isolation Response
B. file accessibility
C. NUMA node size
D. resource reservations
【多选题】
Which two virtual NICs support Wake-on-Lan to resume a virtual machine that is in standby mode? (Choose two)___
A. Flexible
B. E1000E
C. E1000
D. vmxnet 3
【多选题】
Which two logs should be examined to troubleshoot a Windows vCenter Server upgrade failure? (Choose two.)___
A. vminst.log
B. vim-um-msi.log
C. firstboot.log
D. pkgmgr.log
【多选题】
Which are two supported storage primitives for VAAI NAS? (Choose two.)___
A. Full File Clone
B. Reserve Space
C. hardware assisted locking
D. block zeroing
【多选题】
Which two parameters must be configured for Windows in-guest disk mirroring? (Choose two.)___
A. scsi#.returnNoConnectDuringAPD = “FALSE”
B. scsi#.terminateVMOnPDL = “TRUE”
C. scsi#.returnBusyOnNoConnectStatus = “FALSE”
D. scsi#.returnNoConnectDuringAPD = “TRUE”
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用