相关试题
【单选题】
在一个长度为n的顺序表的任一位置插入一个新元素的渐进时间复杂度为___。
A. O(n)
B. O(log2n)
C. O(1)
D. O(n2)
【单选题】
带头结点的单链表first为空的判定条件是:___
A. first == NULL
B. first->next == NULL
C. first->next == first
D. first != NULL
【单选题】
在一个单链表中,若q所指结点是p所指结点的前驱结点,若在q与p之间插入一个s所指的结点,则执行___ 。
A. s→next=p→next; p→next=s
B. p→next=s; s→next=q
C. p→next=s→next; s→next=p
D. q→next=s; s→next=p
【单选题】
线性表是具有n个______的有限序列(n≠0)___
A. 表元素
B. 字符
C. 数据元素
D. 数据项
【单选题】
采用线性链表表示一个向量时,要求占用的存储空间地址___。
A. 必须是连续的
B. 部分地址必须是连续的
C. 一定是不连续的
D. 可连续可不连续
【单选题】
下面关于线性表的叙述错误的是___。
A. 线性表采用顺序存储必须占用一片连续的存储空间
B. 线性表采用链式存储不必占用一片连续的存储空间
C. 线性表采用链式存储便于插入和删除操作的实现
D. 线性表采用顺序存储便于插入和删除操作的实现
【单选题】
在一个长度为n 的顺序表中,向第i个元素(1≤i≤n+1)之前插入一个新元素时,需要向后移动________个元素。___
A. n-i
B. n-i+1
C. n-i-1
D. i
【单选题】
设一个链表最常用的操作是在末尾插入结点和删除尾结点,则选用___最节省时间。
A. 单链表
B. 单循环链表
C. 带尾指针的单循环链表
D. 带头结点的双循环链表
【单选题】
静态链表中指针表示的是___。
A. 内存地址
B. 数组下标
C. 下一元素地址
D. 左、右孩子地址
【单选题】
链表不具有的特点是___。
A. 插入、删除不需要移动元素
B. 可随机访问任一元素
【单选题】
用带头结点的单链表表示的链式队列的队头在链表的___位置。
A. 链头
B. 链尾
C. 链中
D. 第2个结点
【单选题】
顺序表和链表相比存储密度较大,这是因为 ___。
A. 顺序表的存储空间是预先分配的
B. 顺序表不需要增加指针来表示元素之间的逻辑关系
C. 链表中所有节点的地址是不连续的
D. 顺序表中所有元素的存储地址是连续的
【单选题】
在一个单链表中,若删除p所指结点的后续结点,则执行___。
A. p—>next= p—>next—>next;
B. p= p—>next; p—>next= p—>next—>next;
C. p—>next= p—>next
D. p= p—>next—>next;
【单选题】
在一个单链表中,若p所指结点不是最后结点,在p之后插入s所指结点,则执行___。
A. s—>next=p; p—>next=s
B. s—>next=p—>next; p—>next=s
C. s—>next=p—>next; p=s
D. p—>next=s; s—>next=p
【单选题】
判定一个循环队列Q(最多有MAXQSIZE个元素空间)为空的条件为___ 。
A. Q.front==Q.rear
B. Q.front!=Q.rear
C. Q.front==(Q.rear+1)%MAXQSIZE
D. Q.front!=(Q.rear+1)%MAXQSIZE
【单选题】
判定一个循环队列Q(最多有MAXQSIZE个元素空间)为满的条件为___。
A. Q->front==Q->rear
B. Q->front!=Q->rear
C. Q->front==(Q->rear+1)%MAXQSIZE
D. Q->front!=(Q->rear+1)%MAXQSIZE
【单选题】
在循环队列中用数组A[0..m-1] 存放队列元素,其队头和队尾指针分别为front和rear,则当前队列中的元素个数是___。
A. ( front - rear + 1) % m
B. ( rear - front + 1) % m
C. ( front - rear + m) % m
D. ( rear - front + m) % m
【单选题】
栈和队列的共同点是___
A. 都是先进后出
B. 都是先进先出
C. 只允许在端点处插入和删除元素
D. 没有共同点
【单选题】
栈操作的特点是___ 。
A. 只能进行插入
B. 只能进行删除
C. 先进先出
D. 先进后出
【单选题】
4个元素进S栈的顺序是A,B,C,D,经操作POP(S)后栈顶元素是___
【单选题】
一个栈的输入序列为 a b c d e,则不能是出栈序列的为___。
A. b c d a e
B. b c a d e
C. e d a c b
D. a e d c b
【单选题】
一个栈的输入序列为 1 2 3 4 ,则不能是出栈序列的为___。
A. 2 3 4 1
B. 2 3 1 4
C. 4 1 3 2
D. 1 4 3 2
【单选题】
若用一个大小为6的数组来实现循环队列,且当前rear和front的值分别为0和3。当从队列中删除一个元素,再加入两个元素后,rear和front的值分别为___?
A. 1和5
B. 2和4
C. 4和2
D. 5和1
【单选题】
引起队尾指针改变的操作是___。
A. 出队和入队
B. 入队
C. 出队
D. 取队头元素
【单选题】
对于栈操作数据的原则是___。
A. 先进先出
B. 后进先出
C. 后进后出
D. 不分顺序
【单选题】
设有两个串p和q,求q在p中首次出现的位置的运算称作___
A. 连接
B. 模式匹配
C. 求子串
D. 求串长
【单选题】
串是一种特殊的线性表,其特殊性体现在___
A. 可以顺序存储
B. 数据元素是一个字符
C. 可以链接存储
D. 数据元素可以是多个字符
【单选题】
串的长度是___
A. 串中不同字母的个数
B. 串中不同字符的个数
C. 串中所含字符的个数,且大于0
D. 串中所含字符的个数
【单选题】
数组M[1..4,1..5]的每个元素占5个单元,按行优先次序存储在起始地址为1000的连续的内存单元中,则最后一个元素M[4,5] 的地址为 _________
A. 1005
B. 1015
C. 1100
D. 1095
【单选题】
三维数组A[4][5][6]按行优先存储方法存储在内存中,若每个元素占2个存储单元,且数组中第一个元素的存储地址为120,则元素A[3][4][5]的存储地址为___
A. 356
B. 358
C. 360
D. 362
【单选题】
稀疏矩阵可以用三元组顺序表来表示,其中一个三元组数据中不包括非零元的___.
A. 行号
B. 列号
C. 元素值
D. 元素总数
【单选题】
一般数组常采用的存储顺序为___。
A. 先存上三角,再存下三角
B. 以行序为主序或以列序为主序
C. 只能以行序为主序
D. 只能以列序为主序
【单选题】
深度为5的二叉树至多有__________个结点。___
【单选题】
设a,b为一棵二叉树上的两个结点,在中序遍历时,a在b前的条件是___
A. a在b的右方
B. a在b的左方
C. a是b的祖先
D. a是b的子孙
【单选题】
对某二叉树进行前序遍历的结果为ABDEFC,中序遍历的结果为DBFEAC,则后序周游的结果为___
A. DBFEAC
B. DFEBCA
C. BDFECA
D. BDEFAC
【单选题】
某二叉树的中序序列和后序序列正好相反,则该二叉树一定是 的二叉树。___
A. 只有一个结点
B. 高度等于其结点数
C. 任一结点无左孩子
D. 任一结点无右孩子
【单选题】
一颗完全二叉树中根结点的编号为1,而且23号结点有左孩子但没有右孩子,则完全二叉树总共有_______个结点。___
【单选题】
一个有n个叶结点的哈夫曼树具有的结点数为___________。___
A. 2n
B. 2n-1
C. 2n+1
D. 2(n-1)
【单选题】
由权值分别为3,6,7,2,5的叶子结点生成一棵哈夫曼树,它的带权路径长度为 。___
【单选题】
在有n个结点的二叉树中,分支个数共有 。___
A. n-1
B. n+1
C. 2n-1
D. 2n+l
推荐试题
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
【多选题】
Which two options are the primary deployment modeles for mobile device management?___
A. multisite
B. cloud-based
C. on premises
D. hybrid cloud basedo
E. single site
【多选题】
Drag the recommendation on the left to the Cryptographic algorithms on the right, Options will be used more than once.___
A. Avoid——————————————DES,MD5
B. Legacy——————————————SDES,SHA1,HMAC-MD5
【多选题】
Which two are valid types of vLans using PVLANS ?___
A. Community VLAN
B. Backup VLAN
C. Secondary VLAN
D. Isolated VLAN
E. Isolated VLAN
【多选题】
Which two commands are used to implement Resilient lOS Configuration ___
A. Secure boot-config
B. copy running-config tftp
C. copy flash:ios bin tftp
D. copy running-config startup-config
E. secure boot-image
【多选题】
Which two types of firewalls work at layer 4 and above ?___
A. Stateful inspection
B. Network Address Translation
C. Circuit-Level gateway
D. Static packet filter
E. Application Level firewall
【多选题】
Which two default settings for port security are true ?___
A. Violation is Protect
B. Violation is Restrict
C. Violation is Shutdown
D. Maximum number of MAC addresses is 2
E. Maximum number of MAC addresses is 1
【多选题】
Which two are characteristics of RADIUS?___
A. Uses UDP ports 1812 /1813
B. Uses TCP port 49
C. Uses UDP port 49
D.
E. ncrypts only the password between user and server
【多选题】
When setting up a site-to-site VPN with PSK authentication on a Cisco router, which two elements must be configured under crypto map?___
A. pfs
B. nat
C. reverse route
D. peer
E. transform-set
【多选题】
When using the Adaptive Security Device Manager(ASDM), which two options are available to add a new root certificate?___
A. Install from SFTP server
B. Usehttps
C. Install from a file
D. Use LDAP
E. Use SCEP
【多选题】
Which two SNMPv3 services support its capabilities as a secure networ k manage protocol? ___
A. access control
B. the shared secret key
C. authentication
D. authorization
E. accounting
【多选题】
Which two statements about routed firewall mode are true ?___
A. The firewall acts as a routed hop in the network
B. This mode conceals the presence of the firewall
C. The firewall requires a unique iP address for each interface
D. This mode allows the firewall to be added to an existing networ k with minimal additional configuration By default, this mode permits most traffic to pass throug
【多选题】
Which two statements describe DHCP spoofing attacks?___
A. They are used to perform man-in- the-middle attacks
B. They can access most network devices
C. They can modify the flow of traffic in transit. LNGKAIG
D. They protect the identity of ti attacker by masking the DHCP address
E. They can physically modify the network gateway
【多选题】
Which two types of VLANs using PVLANs are valid?___
A. isolated
B. promiscuous
C. backup
D. secondary
E. community
【多选题】
What are two limitations of the self-zone policies on a zone-based firewall?___
A. They are unable to block Https traffic
B. They restrict SNMP traffic.
C. They are unable to support Https traffic
D. They are unable to implement application inspection
E. They are unable to perform rate limiting
【多选题】
Which two descriptions of TACACS+ are true? ___
A. The TACACS+ header is unencrypted
B. It combines a uthentication and authorization
C. It uses TCP as its transport protocol
D. Only the password is encrypted.
E. It uses UDP as its transport protocol.
【多选题】
Which two actions does an IPS perform? ___
A. it spans the traffic
B. it reflects the traffic back to the sender
C. it encrypts the traffic
D. it terminates the user session or connection of the attacker
E. it reconfigures a device to block the traffic
【多选题】
In which form of fraud does an attacker try to learn information such as login credenti account information by ma squerading as a reputable entity or person in email, IM or communication channels ?___
A. phishing
B. Smurfit
C. Hacking
D. Identity Spoofing
【多选题】
Which two ESA services are available for incoming and outgoing mails ?___
A. anti-DoS
B. reputation filter
C. antispam
D. content filter
E. DLP
【多选题】
What are two reasons to recommend SNMPv 3 over SNMPv2?___
A. SNMPv3 is secure because you can configure authe ntication and privacy
B. SNMPv3 is insecure because it send in formation in clear text
C. SNMPv2 is insecure because it send information in clear text
D. SNMPv3 is a Cisco proprietary protocol
E. SNMPv2 is secure because you can configure authentication and privacy
【多选题】
Which two actions can a zone- based firewall apply to a packet as it transits a zone pair?___
A. drop
B. inspect
C. queue
D. quarantine
【单选题】
Which security principle has been violated if data is altered in an unauthorized manner?___
A. accountability
B. confidentiality
C. availability
D. integrity
【单选题】
Which IKE Phase 1 parameter can you use to require the site-to-site VPN to use a pre-shared ?___
A. encryption
B. authentication
C. group
【单选题】
Which command successfully creates an administrative user with a password of "cisco"on a Cisco router?___
A. username Operator privilege 7 password cisco
B. username Operator privilege 1 password cisco
C. username Operator privilege 15 password cisco
D. username Operator password cisco privilege 15
【单选题】
Which EAP method authenticates a client against Active Directory without the use of client-side 802.1X certificates?___
A. EAP-TLS
B. EAP-MSCHAPv2
C. EAP-PEAP
D.
E. AP-GTC
【单选题】
What is a limitation of network-based IPS?___
A. It must be in dividually configured to support every operating system on the network.
B. It is most effective at the in dividual host level
C. It is unable to monitor attacks across the entire netw ork
D. Large installations require numerous sensors to fully protect the network
【单选题】
When would you configure the ip dhcp snooping trust command on a sw itch?___
A. when the switch is connected to a DHCP server
B. when the switch is working in an edge capacit
C. when the switch is connected to a client system
D. when the switch is serving as an aggregator