中级.软件设计师单项选择考试卷模拟考试题_0_第1页
中级.软件设计师单项选择考试卷模拟考试题_0_第2页
中级.软件设计师单项选择考试卷模拟考试题_0_第3页
中级.软件设计师单项选择考试卷模拟考试题_0_第4页
全文预览已结束

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、姓名:_ 班级:_ 学号:_-密-封 -线- 中级.软件设计师单项选择考试卷模拟考试题考试时间:120分钟 考试总分:100分题号一二三四五总分分数遵守考场纪律,维护知识尊严,杜绝违纪行为,确保考试结果公正。1、melissa and love letter made use of the trust that exists between friends or colleagues.imagine receiving an _(71)_from a friend who asks you to open it.this is what happens with melissa and sev

2、eral other similar email _(72)_.uponrunning ,such worms usually proceed to send themselves out to email addresses from the victims address book, previous emails, web pages_(73)_.as administrators seek to block dangerous email attachments through the recognition of well-known _(74)_,virus writers use

3、 other extensions to circumvent such protection.executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.frequently ,hackers try to penetrate networks by sending an attachment that looks like a flash movie ,whi

4、ch, while displaying some cute animation ,simultaneously runs commands in the background to steal your passwords and give the _(75)_access to your network.(71)处填( )a.attachmentb.packetc.datagramd.message2、melissa and love letter made use of the trust that exists between friends or colleagues.imagine

5、 receiving an _(71)_from a friend who asks you to open it.this is what happens with melissa and several other similar email _(72)_.uponrunning ,such worms usually proceed to send themselves out to email addresses from the victims address book, previous emails, web pages_(73)_.as administrators seek

6、to block dangerous email attachments through the recognition of well-known _(74)_,virus writers use other extensions to circumvent such protection.executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.freque

7、ntly ,hackers try to penetrate networks by sending an attachment that looks like a flash movie ,which, while displaying some cute animation ,simultaneously runs commands in the background to steal your passwords and give the _(75)_access to your network.(72)处填( )a.virtualb.virusc.wormsd.bacteria3、me

8、lissa and love letter made use of the trust that exists between friends or colleagues.imagine receiving an _(71)_from a friend who asks you to open it.this is what happens with melissa and several other similar email _(72)_.uponrunning ,such worms usually proceed to send themselves out to email addr

9、esses from the victims address book, previous emails, web pages_(73)_.as administrators seek to block dangerous email attachments through the recognition of well-known _(74)_,virus writers use other extensions to circumvent such protection.executable (.exe) files are renamed to .bat and .cmd plus a

10、whole list of other extensions and will still run and successfully infect target users.frequently ,hackers try to penetrate networks by sending an attachment that looks like a flash movie ,which, while displaying some cute animation ,simultaneously runs commands in the background to steal your passw

11、ords and give the _(75)_access to your network.(73)处填( )a.memoryb.cachesc.portsd.registers4、melissa and love letter made use of the trust that exists between friends or colleagues.imagine receiving an _(71)_from a friend who asks you to open it.this is what happens with melissa and several other sim

12、ilar email _(72)_.uponrunning ,such worms usually proceed to send themselves out to email addresses from the victims address book, previous emails, web pages_(73)_.as administrators seek to block dangerous email attachments through the recognition of well-known _(74)_,virus writers use other extensi

13、ons to circumvent such protection.executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.frequently ,hackers try to penetrate networks by sending an attachment that looks like a flash movie ,which, while disp

14、laying some cute animation ,simultaneously runs commands in the background to steal your passwords and give the _(75)_access to your network.(74)处填( )a.namesb.cookiesc.softwared.extensions5、melissa and love letter made use of the trust that exists between friends or colleagues.imagine receiving an _

15、(71)_from a friend who asks you to open it.this is what happens with melissa and several other similar email _(72)_.uponrunning ,such worms usually proceed to send themselves out to email addresses from the victims address book, previous emails, web pages_(73)_.as administrators seek to block danger

16、ous email attachments through the recognition of well-known _(74)_,virus writers use other extensions to circumvent such protection.executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.frequently ,hackers try to penetrate networks by sending an at

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论