61在5G关键技术中,将传统互联网控制平面与数据平面分离,使网络的灵活性、可管理性和可扩展性大 幅提升的是(63)。
A.软件定义网络(SDN)
B.大规模多输入多输出(MIMO)
C.网络功能虚拟化(NFV)
D.长期演进(LTE)
开始考试练习点击查看答案62以下关于二进制指数退避算法的描述中,正确的是(64)。
A.每次站点等待的时间是固定的,即上次的2倍
B.后一次退避时间一定比前一次长
C.发生冲突不一定是站点发生了资源抢占
D.通过扩大退避窗口杜绝了再次冲突
开始考试练习点击查看答案63下列IEEE 802. 11系列标准中,支持2. 4GHz和5GHz两个工作频段的是(65)。
A.802. 11a
B.802. 11ac
C.802.11b
D.802.11g
开始考试练习点击查看答案64某无线路由器,在2.4GH频道上配置了 2个信道,使用(66)信道间干扰最小。
A.1 和 3
B.4 和 7
C.6 和 10
D.7 和 12
开始考试练习点击查看答案65以下关于层次化网络设计模型的描述中,不正确的是(67)。
A.终端用户网关通常部署在核心层,实现不同区域间的数据高速转发
B.流量负载和VLAN间路由在汇聚层实现
C.MAC地址过滤、路由发现在接入层实现
D.接入层连接无线AP等终端设备
开始考试练习点击查看答案66某存储系统规划配置25块8TB磁盘,创建2个RAID6组,配置1块热备盘,则该存储系统实际存储容 量是(68)。
A.200TB
B.192TB
C.176TB
D.160TB
开始考试练习点击查看答案67《中华人民共和国数据安全法》由中华人民共和国第十三届全国人民代表大会常务委员会第二十九次会 议审议通过,自(69)年9月1日起施行。
A.2019
B.2020
C.2021
D.2022
开始考试练习点击查看答案68以下关于信息化项目成本估算的描述中,不正确的是(70)。
A.项目成本估算指设备采购、劳务支出等直接用于项目建设的经费估算
B.项目成本估算需考虑项目工期要求的影响,工期要求越短成本越高
C.项目成本估算需考虑项目质量要求的影响,质量要求越高成本越高
D.项目成本估算过粗或过细都会影响项目成本
开始考试练习点击查看答案69A network attack is an attempt to gain (71) access to an organization' s network, with the objective of stealing data or performing other malicious activities. ( 72) -of-service (DoS)attack is a cyber-attack in which the attacker seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. In the case of a simple attack, a (73)could have a simple rule added to deny all incoming traffic from the attackers, based on protocols, ports, or the originating IP addresses. In a (74)DoS (DDoS)attack , the incoming traffic flooding the victim originates from (75) different sources.This effectively makes it impossible to stop the attack simply by blocking a single source.
A.unauthorized
B.authorized
C.normal
D.frequent
开始考试练习点击查看答案70A network attack is an attempt to gain (71) access to an organization' s network, with the objective of stealing data or performing other malicious activities. (72) -of-service (DoS)attack is a cyber-attack in which the attacker seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. In the case of a simple attack, a (73)could have a simple rule added to deny all incoming traffic from the attackers, based on protocols, ports, or the originating IP addresses. In a (74)DoS (DDoS)attack , the incoming traffic flooding the victim originates from (75) different sources.This effectively makes it impossible to stop the attack simply by blocking a single source.
A.defense
B.denial
C.detection
D.decision
开始考试练习点击查看答案