当前位置: 首页icon 51CTO软考 > 软考资讯 >考试科目 >2023年5月程序员 模拟一 上午之二十五

2023年5月程序员 模拟一 上午之二十五

作者:mb64e7045ee9ff82023-12-23 01:00:14
备考咨询 刷题指导
添加专属学姐
下载资料 2024上半年软考备考资料+考试大纲
下载按钮 下载
引号

摘要:对于【程序员】软考考试而言,试题无疑是最重要的学习资料之一。在软考备考过程中,吃透试题、掌握试题所考知识点、熟悉试题的出题思路,对我们提升分数的效果是最明显的,通过对试题的反复练习,还可以查漏补缺。今天,给大家带来【2023年5月程序员 模拟一 上午】部分试题的详解,一起来看看吧~1、In the fields of physical security and info

引号
摘要:对于【程序员】软考考试而言,试题无疑是最重要的学习资料之一。在软考备考过程中,吃透试题、掌握试题所考知识点、熟悉试题的出题思路,对我们提升分数的效果是最明显的,通过对试题的反复练习,还可以查漏补缺。今天,给大家带来【2023年5月程序员 模拟一 上午】部分试题的详解,一起来看看吧~



1、In the fields of physical security and information security, access (71)is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called(72).An access control mechanism connects between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate a user seeking access. Typically the authentication function determines whether the user is permitted to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator (73)an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to grant access. An auditing function (74)and keeps a record of user accesses to system resources.In practice, a number of users may cooperatively share the access control function. All operating systems have at least a(75), and in many cases a quite robust, access control component. Add-on security packages can add to the automated access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services.
A、opens
B、monitors
C、maintains
D、seeks

答案:C
答题解析:

在物理安全和信息安全领域,访问(71)是对一个地方或其他资源的访问限制。访问的行为可能意味着消费、输入或使用。允许访问资源被称为(72)。

访问控制机制连接用户(代表用户执行的进程)和系统资源(如应用程序、操作系统、防火墙、路由器、文件和数据库)之间的连接。系统必须首先对用户进行身份验证。通常,身份验证功能决定用户是否允许访问系统。然后,访问控制功能决定是否允许该用户指定的访问权限。安全管理员(73)一个授权数据库,该数据库指定允许该用户访问哪些资源的类型。访问控制函数咨询此数据库以确定是否授予访问权。审计功能(74)并保存用户访问系统资源的记录。

在实践中,一些用户可以合作共享访问控制函数。所有操作系统都至少有一个(75),而且在许多情况下是一个相当健壮的访问控制组件。附加安全包可以添加到操作系统的自动的访问控制功能。特定的应用程序或实用程序,如数据库管理系统,也包括访问控制功能。外部设备,如防火墙,也可以提供访问控制服务。

(73)A.开放 B.监视 C.维护 D.寻找



2、In the fields of physical security and information security, access (71)is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called(72).An access control mechanism connects between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate a user seeking access. Typically the authentication function determines whether the user is permitted to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator (73)an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to grant access. An auditing function (74)and keeps a record of user accesses to system resources.In practice, a number of users may cooperatively share the access control function. All operating systems have at least a(75), and in many cases a quite robust, access control component. Add-on security packages can add to the automated access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services.
A、components
B、monitors
C、mechanisms
D、algorithms

答案:B
答题解析:

在物理安全和信息安全领域,访问(71)是对一个地方或其他资源的访问限制。访问的行为可能意味着消费、输入或使用。允许访问资源被称为(72)。

访问控制机制连接用户(代表用户执行的进程)和系统资源(如应用程序、操作系统、防火墙、路由器、文件和数据库)之间的连接。系统必须首先对用户进行身份验证。通常,身份验证功能决定用户是否允许访问系统。然后,访问控制功能决定是否允许该用户指定的访问权限。安全管理员(73)一个授权数据库,该数据库指定允许该用户访问哪些资源的类型。访问控制函数咨询此数据库以确定是否授予访问权。审计功能(74)并保存用户访问系统资源的记录。

在实践中,一些用户可以合作共享访问控制函数。所有操作系统都至少有一个(75),而且在许多情况下是一个相当健壮的访问控制组件。附加安全包可以添加到操作系统的自动的访问控制功能。特定的应用程序或实用程序,如数据库管理系统,也包括访问控制功能。外部设备,如防火墙,也可以提供访问控制服务。

(74)A.组件 B.监视 C.机制 D.算法



3、In the fields of physical security and information security, access (71)is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called(72).An access control mechanism connects between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate a user seeking access. Typically the authentication function determines whether the user is permitted to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator (73)an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to grant access. An auditing function (74)and keeps a record of user accesses to system resources.In practice, a number of users may cooperatively share the access control function. All operating systems have at least a(75), and in many cases a quite robust, access control component. Add-on security packages can add to the automated access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services.
A、remote
B、native
C、controlled
D、rudimentary

答案:D
答题解析:

在物理安全和信息安全领域,访问(71)是对一个地方或其他资源的访问限制。访问的行为可能意味着消费、输入或使用。允许访问资源被称为(72)。

访问控制机制连接用户(代表用户执行的进程)和系统资源(如应用程序、操作系统、防火墙、路由器、文件和数据库)之间的连接。系统必须首先对用户进行身份验证。通常,身份验证功能决定用户是否允许访问系统。然后,访问控制功能决定是否允许该用户指定的访问权限。安全管理员(73)一个授权数据库,该数据库指定允许该用户访问哪些资源的类型。访问控制函数咨询此数据库以确定是否授予访问权。审计功能(74)并保存用户访问系统资源的记录。

在实践中,一些用户可以合作共享访问控制函数。所有操作系统都至少有一个(75),而且在许多情况下是一个相当健壮的访问控制组件。附加安全包可以添加到操作系统的自动的访问控制功能。特定的应用程序或实用程序,如数据库管理系统,也包括访问控制功能。外部设备,如防火墙,也可以提供访问控制服务。

(75)A.遥远的 B.原始的 C.被控制的 D.基本的



查看完整试题>>>


代理合作学习群