搜题集 >职业资格类 >软考 >试题列表
大数据所涉及关键技术很多,主要包括采集、存储、管理、分析与挖掘相关技术。其中HBase属于()技术。
A.数据采集
B.数据存储
C.数据管理
D.数据分析与挖掘
答案如下:
B解析:考点是大数据的关键技术,HBase是一个分布式、面向列的开源数据库,不同于一般的关系数据库,它是一个适合于非结构化数据存储的数据库,从定义看选B。
IP地址分为全球地址和专用地址,以下属于专用地址的是(42)。
A.172.168.1.2
B.10.1.2.3
C.168.1.2.3
D.92.172.1.2
答案如下:
B解析:略
通过各种线路传导出去,可以将计算机系统的电源线,机房内的电话线、地线等作为媒介的数据信息泄露方式称为()。
A.辐射泄漏
B.传导泄漏
C.电信号泄漏
D.媒介泄漏
答案如下:
B解析:通过各种线路传导出去,可以将计算机系统的电源线,机房内的电话线、地线等作为媒介的数据信息泄露方式称为传导泄漏。
通过TCO分析,我们可以发现IT的真实成本平均超出购置成本的()倍之多,其中大多数的成本并非与技术相关,而是发生在持续进行的服务管理过程之中。
A.1
B.5
C.10
D.20
答案如下:
B解析:TCO模型面向的是一个由分布式的计算、服务台、应用解决方案、数据网络、语音通信、运营中心以及电子商务等构成的TT环境。度量这些设备成本之外的因素,如IT员工的比例、特定活动的员工成本和信息系统绩效指标等也经常被包含在TCO的指标之中。确定一个特定的IT投资是否能给一个企业带来积极价值是一个很具有争论性的话题。企业一般只是把目光放在直接投资上,比如软硬件价格、操作或管理成本。但是IT投资的成本远不止这些,通常会忽视一些间接成本,比如教育、保险、终端用户平等支持、终端用户培训以及停工引起的损失。这些因素也是企业实现一个新系统的成本的一个很重要的组成部分。很多企业允许或者鼓励使用部门预算进行IT购置,其他企业在功能的或者其他各种各样的商业条目中掩盖了与使用和管理技术投资相关的成本。
IT服务质量的属性分为5个特性:安全性、()、有形性、响应性、友好性。
A.可靠性
B.连续性
C.无形性
D.稳定性
答案如下:
A解析:IT服务质量的属性分为5个特性:安全性、可靠性、有形性、响应性、友好性。
局域网中某主机的IP地址为202.116.1.12/21,该局域网的子网掩码为()。
A.255.255.255.0
B.255.255.252.0
C.255.255.248.0
D.255.255.240.0
答案如下:
C解析:根据培训教材中的快速IP地址计算方法可知。X=256-(2^3)=248.
在Kerberos认证系统中,用户首先向()申请初始票据,然后从(请作答此空)获得会话密钥。
A.域名服务器DNS
B.认证服务器AS
C.票据授予服务器TGS
D.认证中心CA
答案如下:
C解析:用户A使用明文,向AS验证身份。认证成功后,用户A和TGS联系。然后从TGS获得会话密钥。
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend( )our welfare.In online environments we depend on a wide spectrun of things,ranging from computer hardware,software and data to people and organizations.A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions,hence,a trusted entity is the same as an entity that is assumed to function according to policy.A consequence of this is that a trust component of a system must work correctly in order for the security of that system to hold,meaning that when a trusted( )fails,then the sytems and applications that depend on it can( )be considered secure.An often cited articulation of this principle is:"a trusted system or component is one that can break your security policy”(which happens when the trust system fails).The same applies to a trusted party such as a service provider(SP for short)that is,it must operate according to the agreed or assumed policy in order to ensure the expected level of securty and quality of services.A paradoxical conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on.This is because the security of an infrastructure consisting of many.
Trusted components typically follows the principle of the weakest link,that is,in many situations the the overall security can only be as strong as the least reliable or least secure of all the trusted components.We cannot avoid using trusted security components,but the fewer the better.This is important to understand when designing the identity management architectures,that is,fewer the trusted parties in an identity management model,stronger the security that can be achieved by it.
The transfer of the social constructs of identity and trust into digital and computational concepts helps in designing and implementing large scale online markets and communities,and also plays an important role in the converging mobile and Internet environments.Identity management(denoted Idm hereafter)is about recognizing and verifying the correctness of identitied in online environment.Trust management becomes a component of( )whenever different parties rely on each other for identity provision and authentication.IdM and Trust management therefore depend on each other in complex ways because the correctness of the identity itself must be trusted for the quality and reliability of the corresponding entity to be trusted.IdM is also an essential concept when defining authorisation policies in personalised services.
Establishing trust always has a cost,so that having complex trust requirement typically leads to high overhead in establishing the required trust.To reduce costs there will be incentives for stakeholders to“cut corners”regarding trust requirements,which could lead to inadequate security.The challenge is to design IdM systems with relatively simple trust requirements.Cryptographic mechanisms are often a core component of IdM solutions,for example,for entity and data authentication.With cryptography,it is often possible to propagate trust from where it initially exists to where it is needed.The establishment of initial( )usually takes place in the physical world,and the subsequent propagation of trust happens online,often in an automated manner.
A.with
B.on
C.of
D.for
答案如下:
B解析:略
__()__不属于计算机输入设备。
A.扫描仪
B.投影仪
C.数字化仪
D.数码照相机
答案如下:
B解析:显示分辨率是指显示屏上能够显示出的像素数目。水平分辨率:指每行显示多少个像素垂直分辨率:只显示屏分成多少行
下列测试指标中,属于光纤指标的是( ),仪器(请作答此空)可在光纤的一端测得光纤的损耗。
A.光功率计
B.稳定光源
C.电磁辐射测试笔
D.光时域反射仪
答案如下:
D解析:光纤指标包含波长窗口参数,光纤布线链路的最大衰减值,光回波损耗。
联系客服 会员中心
TOP