【单选题】
在一个单链表中,若删除p所指结点的后续结点,则执行___。
A. p—>next= p—>next—>next;
B. p= p—>next; p—>next= p—>next—>next;
C. p—>next= p—>next
D. p= p—>next—>next;
查看试卷,进入试卷练习
微信扫一扫,开始刷题
相关试题
【单选题】
在一个单链表中,若p所指结点不是最后结点,在p之后插入s所指结点,则执行___。
A. s—>next=p; p—>next=s
B. s—>next=p—>next; p—>next=s
C. s—>next=p—>next; p=s
D. p—>next=s; s—>next=p
【单选题】
判定一个循环队列Q(最多有MAXQSIZE个元素空间)为空的条件为___ 。
A. Q.front==Q.rear
B. Q.front!=Q.rear
C. Q.front==(Q.rear+1)%MAXQSIZE
D. Q.front!=(Q.rear+1)%MAXQSIZE
【单选题】
判定一个循环队列Q(最多有MAXQSIZE个元素空间)为满的条件为___。
A. Q->front==Q->rear
B. Q->front!=Q->rear
C. Q->front==(Q->rear+1)%MAXQSIZE
D. Q->front!=(Q->rear+1)%MAXQSIZE
【单选题】
在循环队列中用数组A[0..m-1] 存放队列元素,其队头和队尾指针分别为front和rear,则当前队列中的元素个数是___。
A. ( front - rear + 1) % m
B. ( rear - front + 1) % m
C. ( front - rear + m) % m
D. ( rear - front + m) % m
【单选题】
栈和队列的共同点是___
A. 都是先进后出
B. 都是先进先出
C. 只允许在端点处插入和删除元素
D. 没有共同点
【单选题】
栈操作的特点是___ 。
A. 只能进行插入
B. 只能进行删除
C. 先进先出
D. 先进后出
【单选题】
4个元素进S栈的顺序是A,B,C,D,经操作POP(S)后栈顶元素是___
【单选题】
一个栈的输入序列为 a b c d e,则不能是出栈序列的为___。
A. b c d a e
B. b c a d e
C. e d a c b
D. a e d c b
【单选题】
一个栈的输入序列为 1 2 3 4 ,则不能是出栈序列的为___。
A. 2 3 4 1
B. 2 3 1 4
C. 4 1 3 2
D. 1 4 3 2
【单选题】
若用一个大小为6的数组来实现循环队列,且当前rear和front的值分别为0和3。当从队列中删除一个元素,再加入两个元素后,rear和front的值分别为___?
A. 1和5
B. 2和4
C. 4和2
D. 5和1
【单选题】
引起队尾指针改变的操作是___。
A. 出队和入队
B. 入队
C. 出队
D. 取队头元素
【单选题】
对于栈操作数据的原则是___。
A. 先进先出
B. 后进先出
C. 后进后出
D. 不分顺序
【单选题】
设有两个串p和q,求q在p中首次出现的位置的运算称作___
A. 连接
B. 模式匹配
C. 求子串
D. 求串长
【单选题】
串是一种特殊的线性表,其特殊性体现在___
A. 可以顺序存储
B. 数据元素是一个字符
C. 可以链接存储
D. 数据元素可以是多个字符
【单选题】
串的长度是___
A. 串中不同字母的个数
B. 串中不同字符的个数
C. 串中所含字符的个数,且大于0
D. 串中所含字符的个数
【单选题】
数组M[1..4,1..5]的每个元素占5个单元,按行优先次序存储在起始地址为1000的连续的内存单元中,则最后一个元素M[4,5] 的地址为 _________
A. 1005
B. 1015
C. 1100
D. 1095
【单选题】
三维数组A[4][5][6]按行优先存储方法存储在内存中,若每个元素占2个存储单元,且数组中第一个元素的存储地址为120,则元素A[3][4][5]的存储地址为___
A. 356
B. 358
C. 360
D. 362
【单选题】
稀疏矩阵可以用三元组顺序表来表示,其中一个三元组数据中不包括非零元的___.
A. 行号
B. 列号
C. 元素值
D. 元素总数
【单选题】
一般数组常采用的存储顺序为___。
A. 先存上三角,再存下三角
B. 以行序为主序或以列序为主序
C. 只能以行序为主序
D. 只能以列序为主序
【单选题】
深度为5的二叉树至多有__________个结点。___
【单选题】
设a,b为一棵二叉树上的两个结点,在中序遍历时,a在b前的条件是___
A. a在b的右方
B. a在b的左方
C. a是b的祖先
D. a是b的子孙
【单选题】
对某二叉树进行前序遍历的结果为ABDEFC,中序遍历的结果为DBFEAC,则后序周游的结果为___
A. DBFEAC
B. DFEBCA
C. BDFECA
D. BDEFAC
【单选题】
某二叉树的中序序列和后序序列正好相反,则该二叉树一定是 的二叉树。___
A. 只有一个结点
B. 高度等于其结点数
C. 任一结点无左孩子
D. 任一结点无右孩子
【单选题】
一颗完全二叉树中根结点的编号为1,而且23号结点有左孩子但没有右孩子,则完全二叉树总共有_______个结点。___
【单选题】
一个有n个叶结点的哈夫曼树具有的结点数为___________。___
A. 2n
B. 2n-1
C. 2n+1
D. 2(n-1)
【单选题】
由权值分别为3,6,7,2,5的叶子结点生成一棵哈夫曼树,它的带权路径长度为 。___
【单选题】
在有n个结点的二叉树中,分支个数共有 。___
A. n-1
B. n+1
C. 2n-1
D. 2n+l
【单选题】
设树T的度为4,其中度为1,2,3和4的结点个数分别为4,2,1,1,则T中的叶子数为( )。___
【单选题】
设一个二叉树共13个结点,那么它最大高度是 。___
A. 13/2
B. log213
C. ln 13
D. 13
【单选题】
一个有n个顶点的连通无向图至少有___________条边。___
A. n-1
B. n
C. n+1
D. n+2
【单选题】
设无向图G中有n个顶点m条边,则其对应的邻接表中的表头结点和边结点的个数分别为___________。___
A. n,m
B. m,n
C. 2n,m
D. n,2m
【单选题】
任何一个无向连通带权图的最小生成树____________。___
A. 只有一棵
B. 有一棵或多棵
C. 一定有多棵
D. 可能不存在
【单选题】
可以判断一个有向图中是否含有回路的方法为___________。___
A. 广度优先遍历
B. 深度优先遍历
C. 拓扑排序
D. 求最短路径
【单选题】
设无向图用邻接矩阵存储,则顶点i的度等于矩阵中 。___
A. 第i行0元素个数之和
B. 第i行1元素个数之和
C. 第i行和第i列1元素个数之和
D. 第i行和第i列0元素个数之和
【单选题】
在一个有16个顶点的有向图中,所有顶点的入度之和与所有顶点的出度之和的差是( )。___
【单选题】
下面 B 算法适合用于构造一个稠密图的最小生成树, 算法适合用于构造一个稀疏图的最小生成树。___
A. Dijkstra算法
B. Prim算法
C. Floyd算法
D. Kruskal算法
【单选题】
请指出在顺序表{2、5、7、10、14、15、18、23、35、41、52}中,用二分法查找关键码12 需做______次关键码比较。___
【单选题】
采用顺序搜索方法查找长度为n的顺序表时,搜索成功的平均搜索长度为( )。___
A. : n
B. : n/2
C. : (n-1)/2
D. : (n+1)/2
【单选题】
顺序查找法适合于存储结构为 的线性表。___
A. 散列存储
B. 顺序存储或链接存储
C. 压缩存储
D. 索引存储
【单选题】
采用折半查找方法查找长度为n的线性表时,每个元素的平均查找长度为 .___
A. O(n2)
B. O(nlog2n)
C. O(n)
D. O(log2n)
推荐试题
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode
【单选题】
Which command do you enter to verify that a vpn connection is established between two endpoints and that the connection is passing traffic? ___
A. Firewall#sh crypto session
B. Firewall#debug crypto isakmp
C. Firewall#tsh crypto ipsec sa
D. Firewall#sh crypto isakmp sa
【单选题】
which type of Pvlan port allows communication from all port types?___
A. isolated
B. in -line
C. community
D. promiscuous
【单选题】
Which command do you enter to configure your firewall to conceal internal addresses?___
A. no ip directed-broadcast
B. no ip logging facility
C. no proxy-arp
D. no ip inspect audit-trial
E. no ip inspect
F. route
【单选题】
Which feature defines a campus area network? ___
A. It has a limited number of segments.
B. It has limited or restricted Internet access
C. It lacks ex1ternal connectivity.
D. It has a single geographic location
【单选题】
What technology can you use to provide data confidentiality data integrity and data origin authentication on your network?___
A. IPSec
B. Certificate Authority
C. IKE
D. Data
E. ncryption Standards
【单选题】
which standard is a hybrid protocol that uses oakley and skerne ke y exchanges is an ISAKMP framework?___
【单选题】
What is the actual los privilege level of User Exec mode?___
【单选题】
What is the effect of the asa command crypto isakmp nat-traversal?___
A. It opens port 500 only on the out side interface
B. It opens port 500 only on the inside interface
C. It opens port 4500 on all interfaces that are IPSec enabled
D. It opens port 4500 only on the out side interfac
【单选题】
Which Fire POWER preproce ssor engine is used to prevent SYN attacks?___
A. Inline normalization
B. IP Defragmentation
C. Ports can
D. etection
【单选题】
Which NAT type allows objects or groups to reference an IP address ?___
A. identity NAt
B. static NAT
C. dynamic
D. dynamic NAT
【单选题】
Which Auto NAT policies are processed first?___
A. Dynamic NAT with longest prefix
B. Dynamic NAT with shortest prefix
C. static NAT with longest prefix
D. static NAT with shortest prefix
【单选题】
Which feature allows a dynamic Pat pool to se lect the next address in the pat pool instead of the next port of an existing address?___
A. next IP
B. round robin
C. dynamic rotation
D. NAT address rotation
【单选题】
Which IPS detection method can you use to detect attacks that are based on the attackers IP address?___
A. anomally-based
B. policy-based
C. signature-based
D. reputation-based
【单选题】
Which type of encryption technology has the broadest platform support?___
A. software
B. middleware
C. file-level
D. hardware
【单选题】
Which type of address translation supports the initiation of comm unications bidirectionally ?___
A. multi-session PAT
B. dynamic NAT
C. dynamic PAT
D. static NAT
【单选题】
Which label is given to a person who uses existing computer scripts to hack into computers while lacking the expertise to write the own?___
A. script kiddy
B. white hat hacker
C. hacktivist
D. phreaker
【单选题】
What is the primary purpose of a defined rule in an IPS?___
A. to configure an event action that takes place when a signature is triggered
B. to define a set of actions that occur when a specific user logs in to the system
C. to configure an event action that is pre-defined by the system administrator
D. to detect internal attacks
【单选题】
Which option is the default valuce for the Diffie- Hell man group when configuring a site-to-site VPn on an asa device ?___
A. Group 1
B. Group 2
C. Group 5
D. Group 7
【单选题】
Which feature filters CoPP packets?___
A. access control lists
B. class maps
C. policy maps
D. route maps
【单选题】
Which command is used in global configuration mode to enable AAA?___
A. configure-model aaa
B. configure aaa-modelA
C. aaa new-model
D. aaa
E. XEC
【单选题】
Which statement about the given configuration is true?___
A. The single-connection command causes the device to establish one connection for all TACACS
B. The single-connection command causes the device to process one TacAcs request and then move to the next server
C. The timeout com mand causes the device to move to the next server after 20 seconds of TACACS inactive
【多选题】
What are two well-known security terms?___
A. phishing//网络钓鱼
B. ransomware //勒索软件
C. BPDU guard
D. LACP
E. hair-pinning
【多选题】
Which two commands must you enter to securely archive the primary bootset of a device___
A. router(config )#secure boot-config
B. router(config)#auto secure
C. router(config)#secure boot-image
D. router(config)#service passw ord-encryption
【多选题】
Which two functions can SIEM provide ?___
A. correlation between logs and events from multiple systems
B. event aggregation that allows for reduced log storage requirements
C. proactive malware analysis to block malicious traffic
D. dual-factor authentication
E. centralized firewall management
【多选题】
Which two features of Cisco Web Reputation tracking can mitigate web-based threats?___
A. buffer overflow filterin dhsuowip
B. Bayesian filters
C. web reputation filters
D. outbreak filtering
E. exploit filtering
【多选题】
What are two challenges when deploying host- level IPS? ___
A. The deployment must support multiple operating systems.
B. It is unable to provide a complete networ k picture of an attack.
C. It is unable to determine the outcome of e very attack that it detects
D. It does not provide protection for offsite computers
E. It is unable to detect fragmentation attacks