● ARP 协 议的 作 用 是 (61) ,ARP 报文封装在 (62) 中传送。
A.由 IP 地址查找对应的 MAC 地址
B.由 MAC 地址查找对应的 IP 地址
C.由 IP 地址查找对应的端口号
D.由 MAC 地址查找对应的端口号
试卷相关题目
- 1● 对于具有 n 个元素的一个数据序列,若只需得到其中第 k 个元素之前的部分排序, 最好采用 (59) ,使用分治(Divide and Conquer)策略的是 (60) 算法。
A.希尔排序
B.直接插入排序
C.快速排序
D.堆排序
开始考试点击查看答案 - 2● (58) 算法策略与递归技术的联系最弱。
A.动态规划
B.贪心
C.回溯
D.分治
开始考试点击查看答案 - 3● 求单源点最短路径的迪杰斯特拉(Dijkstra)算法是按 (57) 的顺序求源点到各顶点的最短路径的。
A.路径长度递减
B.路径长度递增
C.顶点编号递减
D.顶点编号递增
开始考试点击查看答案 - 4● 对于n个元素的关键字序列{k1 , k 2 ,..., k n } ,当且仅当满足关系 <a href="https://img.examcoo.com/paper/102810/201101/28213618.gif" rel="lightbox" target="_blank"><img hspace="0" vspace="0" width="295" height="24" _djrealurl="/uploads/4/102810/images/201101/28213618.gif" src="https://img.examcoo.com/paper/102810/201101/28213618.gif"></a> 称其为小根堆,反之则为大根堆。以下序列中,(56) 不符合堆的定义。
A.(4,10,15,72,39,23,18)
B.(58,27,36,12,8,23,9)
C.(4,10,18,72,39,23,15)
D.(58,36,27,12,8,23,9)
开始考试点击查看答案 - 5● 对于二维数组 a[0..4,1..5],设每个元素占 1 个存储单元,且以列为主序存储,则元素 a[2,2]相对于数组空间起始地址的偏移量是 (55)。
A.5
B.7
C.10
D.15
开始考试点击查看答案 - 6● 802.11 标准定义的分布式协调功能采用了 (63) 协议。
A.CSMA/CD
B.CSMA/CA
C.CDMA/CD
D.CDMA/CA
开始考试点击查看答案 - 7● 设有两个子网 202.118.133.0/24 和 202.118.130.0/24,如果进行路由汇聚,得到的网 络地址是 (64) 。
A.202.118.128.0/21
B.202.118.128.0/22
C.202.118.130.0/22
D.202.118.132.0/20
开始考试点击查看答案 - 8● 路由器收到一个数据包,其目标地址为 195.26.17.4,该地址属于 (65)子网。
A.195.26.0.0/21
B.195.26.16.0/20
C.195.26.8.0/22
D.195.26.20.0/22
开始考试点击查看答案 - 9● NAC’s(Network Access Control) role is to restrict network access to only compliant endpoints and (66) users. However, NAC is not a complete LAN (67) solution; additional proactive and (68) security measures must be implemented. Nevis is the first and only comprehensive LAN security solution that combines deep security processing of every packet at 10Gbps, ensuring a high level of security plus application availability and performance. Nevis integrates NAC as the first line of LAN security (69) . In addition to NAC, enterprises need to implement role-based network access control as well as critical proactive security measures— real-time, multilevel (70)inspection and microsecond threat containment.
A.automated
B.distinguished
C.authenticated
D.destructed
开始考试点击查看答案 - 10● Virtualization is an approach to IT that pools and shares (71) so that utilization is optimized and supplies automatically meet demand. Traditional IT environments are often silos, where both technology and human (72)are aligned around an application or business function. With a virtualized (73) , people, processes, and technology are focused on meeting service levels, ( 74 ) is allocated dynamically, resources are optimized, and the entire infrastructure is simplified and flexible. We offer a broad spectrum of virtualization (75) that allows customers to choose the most appropriate path and optimization focus for their IT infrastructure resources.
A.advantages
B.resources
C.benefits
D.precedents
开始考试点击查看答案
最新试卷
注册安全工程师注册安全工程师安全生产法及相关法律知识安全
类别:建筑类其它注册安全工程师注册安全工程师安全生产法及相关法律知识国家
类别:建筑类其它注册安全工程师注册安全工程师安全生产法及相关法律知识2019
类别:建筑类其它注册安全工程师注册安全工程师安全生产法及相关法律知识2018
类别:建筑类其它注册安全工程师注册安全工程师安全生产法及相关法律知识2018
类别:建筑类其它注册安全工程师注册安全工程师安全生产法及相关法律知识2018
类别:建筑类其它注册安全工程师注册安全工程师安全生产法及相关法律知识2014
类别:建筑类其它注册安全工程师注册安全工程师安全生产法及相关法律知识2014
类别:建筑类其它注册安全工程师注册安全工程师安全生产法及相关法律知识2014
类别:建筑类其它注册安全工程师注册安全工程师安全生产法及相关法律知识2014
类别:建筑类其它