单选

●入侵检测通过对计算机网络或计算机系统中的若干关键点收集信息并进行分析,发现网络或系统中是否有违反安全策略的行为和被攻击的迹象。进行入侵检测的软件和硬件的组合就构成了入侵检测系统。(17)是入侵检测系统的核心。

(17)

  • ●入侵检测通过对计算机网络或计算机系统中的若干关键点收集信息并进行分析,发现网络或系统中是否有违反安全策略的行为和被攻击的迹象。进行入侵检测的软件和硬件的组合就构成了入侵检测系统。(17)是入侵检测系统的核心。    (17)A.评估主要系统和数据的完整性   
  • B.信息的收集
  • C.系统审计   
  • D.数据分析
参考答案
您可能感兴趣的试题

●You h

  • ●You have just taken control of a project in the middle of execution and need to learn who has approval authority for revisions in scope. (75)document provides this information.    (75) A. Resource assignment matrix   &n
  • B. Change control plan
  • C. Project charter             
  • D. Client organization chart

●Your project is behind schedule due to conflict between te

  • ●Your project is behind schedule due to conflict between team members. Having resolved the conflict, to get the project back on schedule, you should consider(74).    (74) A. crashing the schedule
  • B. performing resource leveling
  • C. conducting reverse resource allocation scheduling
  • D. utilizing the critical chair resources

  • ● An example of scope verification is (73).    (73) A. review the performance of an installed software module
  • B. managing changes to the project schedule
  • C. decomposing the WBS to a work package level
  • D. performing a benefit/cost analysis to determine if we should proceed with the project

● The TCP protocol is

  • ● The TCP protocol is a (72) layer protocol.    (72) A. physical  
  • B. network   
  • C. transport   
  • D. application

●The connection between two networks to form.

  • ●The connection between two networks to form. an internet is handled by a machine known as a (71).    (71) A. bridge    
  • B. server    
  • C. router    
  • D. switch
¥

订单号:

遇到问题请联系在线客服

订单号:

遇到问题请联系在线客服