位置:首页 > 题库频道 > 其它分类 > 计算机其它 > 专业技术高级资格系统分析师综合知识2006年上半年系统分析师上午试卷

● 正确地描述了RADIUS协议的是: (62) 。

发布时间:2024-07-09

A.如果需要对用户的访问请求进行提问(Challenge),则网络访问服务器(NAS)对用户密码进行加密,并发送给RADIUS认证服务器

B.网络访问服务器(NAS)与RADIUS认证服务器之间通过UDP数据报交换请求/响应信息

C.在这种C/S协议中,服务器端是网络访问服务器(NAS),客户端是RADIUS认证服务器

D.通过RADIUS协议可以识别非法的用户,并记录闯入者的日期和时间

试卷相关题目

  • 1● (60) 图像通过使用彩色查找表来显示图像颜色

    A.真彩色

    B.伪彩色

    C.直接色

    D.矢量

    开始考试点击查看答案
  • 2●在选择数据压缩算法时需要综合考虑 (59) 。

    A.数据质量和存储要求

    B.数据的用途和计算要求

    C.数据质量、数据量和计算的复杂度

    D.数据的质量和计算要求

    开始考试点击查看答案
  • 3●JPEG压缩编码算法中,(58)是错误的。

    A.JPEG算法与图像的彩色空间无关

    B.对变换后的系数进行量化是一种无损压缩过程

    C.量化后的交流系数(AC)使用行程长度编码(RLE)方法

    D.量化后的直流系数(DC)使用差分脉冲调制编码(DPCM)方法

    开始考试点击查看答案
  • 4●多媒体电子出版物创作的主要步骤为 (57) 。

    A.应用目标分析、脚本编写、媒体数据准备、设计框架、制作合成、测试

    B.应用目标分析、脚本编写、设计框架、媒体数据准备、制作合成、测试

    C.应用目标分析、设计框架、脚本编写、媒体数据准备、制作合成、测试

    D.应用目标分析、媒体数据准备、脚本编写、设计框架、制作合成、测试

    开始考试点击查看答案
  • 5●设B={P, Q),则B上可以定义 (55) 个等价关系。

    A.2

    B.3

    C.4

    D.6

    开始考试点击查看答案
  • 6● 在层次化网络设计方案中, (64) 是核心层的主要任务。

    A.高速数据转发

    B.接入Intemet

    C.工作站接入网络

    D.实现网络的访问策略控制

    开始考试点击查看答案
  • 7● “<title style="italic">science</title>”是XML中一个元素的定义,其中元素标记的属性值是 (65) 。

    A.title

    B.style

    C.italic

    D.science

    开始考试点击查看答案
  • 8● SOX is an alternative (66) for XML. It is useful for reading and creating XML content in a (67) editor. It is then easily transformed into proper XML. SOX was created because developers can spend a great deal of time with raw XML.For many of us, the popular XML (68) have not reached a point where their tree views, tables and forms can completely substitute for the underlying (69) language. This is not surprising when one considers that developers still use a text view, albeit enhanced, for editing other languages such  as Jav

    A.SOX uses (70) to represent the structure of an XML document, which eliminates the need for closing tags and a number of quoting devices. The result is surprisingly clear.A.semantic

    B.pragmatics

    C.syntax

    D.grammar

    开始考试点击查看答案
  • 9● With hundreds of millions of electronic (71) taking place daily, businesses and organizations have a strong incentive to protect the (72) of the data exchanged in this manner, and to positively ensure the (73) of those involved in the transactions. This has led to an industry-wide quest for better, more secure methods for controlling IT operations, and for deploying strong security mechanisms deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the imaginations of the security community has been the development of standards-based security (74) that can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities in (75) and integrating security provisions at the deepest levels of the machine operation has significant benefits for both users and those responsible for securing IT operations.

    A.devices

    B.transactions

    C.communications

    D.businesses

    开始考试点击查看答案
返回顶部