大决战电视剧在线观看央视6集|亚洲a级片|成人福利在线观看|方子传完整版未删减版电影,国产又黄又猛又粗又爽的视频,不安人在线观看未删减完整版 ,亚洲精品1区2区

軟題庫 培訓(xùn)課程
當(dāng)前位置:信管網(wǎng) >> 在線考試中心 >> 軟件設(shè)計師題庫 >> 試題查看
試卷年份2016年上半年
試題題型【單選題】
試題內(nèi)容

In the fields of physical security and information security, access contro lis the selective restriction of access to a place orothe rresource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization(授權(quán)).
An access control mechanism(1) between a user (or a process executing on behalf of a user) and system resources, such as applications,operating systems,firewalls,routers,files,and databases.The system must first a uthenticate(驗證)a user seeking access.Typically the authentication function determines whether the user is(2 )to access the system at all. Then the access control function determines if the specific requested access by this user is permitteD. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(3 )access. An auditing function monitors and keeps a record of user accesses to system resources.
In practice,a number of(4 )may cooperatively share the access control function. All operating systems have at least arudimentary(基本的),and in many cases aquite robust,access control component.Add-on security packages can add to the(5 )access control capabilities of the OS. Particular applications orutilities, such as a database management system, also incorporate access control functions. External devices,such as firewalls, can also provide access control services.
(1)A.cooperates
B.coordinates
C.connects
D.mediates
(2)A.denied
B.permitted
C.prohibited
D.rejected
(3)A.open
B.monitor
C.grant
D.seek
(4)A.components
B.users
C.mechanisms
D.a(chǎn)lgorithms
(5)A.remote
B.native
C.controlled
D.Automated

查看答案

相關(guān)試題