当前位置:高级网络规划设计师题库>专业英语题库

问题:

[单选,共用题干题]

With hundreds of millions of electronic (11)taking place daily, businesses and organizations have a strong incentive to protect the. (12) of the data exchanged in this manner, and to positively ensure the (13) of those involved in the transactions. This has led to an industry-wide quest for better, more secure methods for controlling IT operations,and for deploying strong security mechanisms deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the imaginations of the security community has been the development of standards-based security(14) that can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities in (15) and integrating security provisions at the deepest levels of the machine operation has significant benefits for both users and those responsible for securing IT operations.

空白处(14)应选择()

A . A.appliances
B . chips
C . tools
D . means

Astute service providers realize that the continued support of legacy X.25 and asynchronous network element using separate operations network is cost(16).For example,the maintenance of multiple networks can require additional staff. Often, this staff must be trained on multiple vendor technologies, sometimes requiring parallel groups specializing in each (17) .Hence, additional maintenance procedures must be maintained and administrative records are (18) .The duplication of transport facilities to carry (19)network traffic is an inefficient use of resources. And not surprisingly, more technologies installed in a central office means the necessity for more physical space, and an increase in power connections and power consumption migration of these (20) network elements to IP-based DCns is alogical strategy.空白处(16)应选择() A.prohibitive。 feasible。 connective。 special。 在Windows系统中,若要移动窗口,可用鼠标拖动窗口的()。 标题栏。 菜单栏。 状态栏。 工具栏。 在Windows资源管理器的左窗格中,若显示的文件夹图标前带有""标志,则意味着该文件夹()。 是空文件夹。 仅含有文件。 含有子文件夹。 仅含有隐藏文件。 With hundreds of millions of electronic (11)taking place daily, businesses and organizations have a strong incentive to protect the. (12) of the data exchanged in this manner, and to positively ensure the (13) of those involved in the transactions. This has led to an industry-wide quest for better, more secure methods for controlling IT operations,and for deploying strong security mechanisms deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the imaginations of the security community has been the development of standards-based security(14) that can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities in (15) and integrating security provisions at the deepest levels of the machine operation has significant benefits for both users and those responsible for securing IT operations.空白处(13)应选择() A.identities。 homogeneities。 creations。 operations。 ()属于系统软件,它直接执行高级语言源程序或与源程序等价的某种中间代码。 编译程序。 预处理程序。 汇编程序。 解释程序。

With hundreds of millions of electronic (11)taking place daily, businesses and organizations have a strong incentive to protect the. (12) of the data exchanged in this manner, and to positively ensure the (13) of those involved in the transactions. This has led to an industry-wide quest for better, more secure methods for controlling IT operations,and for deploying strong security mechanisms deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the imaginations of the security community has been the development of standards-based security(14) that can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities in (15) and integrating security provisions at the deepest levels of the machine operation has significant benefits for both users and those responsible for securing IT operations.

空白处(14)应选择()
参考答案:

  参考解析

分析每天发生成千上万次的电子交易,这使得商业机构产生了保护电子交易数据完整性和确认交易数据标识的迫切需求,从而导致整个行业都在探索更好更安全的控制IT操作的方法,探索在整个网络基础结构和客户设备中深入而广泛地部署增强的安全机制的方法。一种能够实现安全社区的有效设想是在客户机硬件中开发基于标准的安全芯片。在硅片中封装核心安全能力、在机器操作的最深层次集成安全设施的理论,对用户、对那些负责IT安全运营的人员都有极大的好处。

相关题目:

在线 客服