2013年上半年软考《嵌入式系统设计师》上午模拟试卷二

0
收藏   分享
  • 卷面总分:75分
  • 试卷类型:模拟考试
  • 测试费用:免费
  • 答案解析:是
  • 练习次数:35次
  • 作答时间:150分钟
试卷简介
本试卷紧扣教材的考点和难点,依照历年真题标准进行命制,能够帮助考生进行针对性的强化训练,使考生避免陷入漫无边际而收效甚微的题海苦战;其中答案经过命题专家深度研究,标准准确,解析详细、透彻,能够使考生扩大知识面,发展思维,在考试中做到有的放矢。
试卷预览
1

(74)

  • A.hypertext
  • B.computation
  • C.expectation
  • D.bookmark
5

(75)

  • A.habits signature
  • B.site
  • C.tages
  • D.address
5

(73)

  • A.victimized
  • B.personate
  • C.identity
  • D.control
5

(72)

  • A.connecting
  • B.binding
  • C.looking
  • D.contenttagging
5

Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to(71)Web sites without their knowledge or consent.  Pharming has been called "phishing without a lure."

In phishing, the perpetrator sends out legitimate-(72)E-mails, appearing to come from some of the Web's most popular sites, in ah effort to obtain personal and financial information from individual recipients. But in pharming, larger numbers of computer users can be(73)because it is not necessary to target individuals one by one and no conscious action is required on the part of the victim. In one form. of pharming attack, code sent in an E-mail modifies local host files on a personal computer. The host files convert URLs into the number strings that the computer uses to access Web sites. A computer with a compromised host file will go to the fake Web site even if a user types in the correct Internet address or clicks on an affected(74)entry. Some spyware removal programs can correct the corruption, but it frequently recurs unless the user changes browsing(75).

  • A.few
  • B.fraudulent
  • C.normal
  • D.structured
5

(70)

  • A.software
  • B.form
  • C.computer
  • D.silicon
5

(69)

  • A.appliances
  • B.chips
  • C.tools
  • D.means
5

(67)

  • A.operation
  • B.completeness
  • C.integrity
  • D.interchange
5

(68)

  • A.identities
  • B.homogeneities
  • C.creations
  • D.operations