首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
With hundreds of millions of electronic(161)taking place daily, businesses and organizations have a strong incentive to protect
With hundreds of millions of electronic(161)taking place daily, businesses and organizations have a strong incentive to protect
admin
2009-05-15
44
问题
With hundreds of millions of electronic(161)taking place daily, businesses and organizations have a strong incentive to protect the(162)of the data exchanged in this manner, and to positively ensure the(163)of those involved in the transactions. This has led to an industry-wide quest for better, more secure methods for controlling IT operations, and for deploying strong security mechanisms deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the imaginations of the security community has been the development of standards-based security(164 )that can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities in(165 )and integrating security provisions at the deepest levels of the machine operation has significant benefits for both users and those responsible for securing IT operations.
选项
A、software
B、form
C、computer
D、silicon
答案
D
解析
每天发生成千上万次的电子交易,这使得商业机构产生了保护电子交易数据完整性和确认交易数据标识的迫切需求,从而导致整个行业都在探索更好更安全的控制IT操作的方法,探索在整个网络基础结构和客户设备中深入而广泛地部署增强的安全机制的方法。一种能够实现安全社区的有效设想是在客户机硬件中开发基于标准的安全芯片。在硅片中封装核心安全能力、在机器操作的最深层次集成安全设施的理论,对用户、对那些负责IT安全运营的人员都有极大的好处。
转载请注明原文地址:https://kaotiyun.com/show/6mLZ777K
本试题收录于:
系统分析师上午综合知识考试题库软考高级分类
0
系统分析师上午综合知识考试
软考高级
相关试题推荐
Globalorganizationsthattransferdataacrossinternationalboundariesmustabidebyguidelinesandtransborderinformationflo
Thereareseveraldifferenttypesofdatabases.Whichtypedoesthegraphicthatfollowsillustrate?
Whichofthefollowingisthebestdescriptionofacomponent-basedsystemdevelopmentmethod?
Thereareseveraldifferenttypesofsinglesign-onprotocolsandtechnologiesinusetoday.Whattypeoftechnologyisillustra
Emilyislisteningtonetworktrafficandcapturingpasswordsastheyaresenttotheauthenticationserver.Sheplanstouseth
HannahhasbeenassignedthetaskofinstallingWebaccessmanagement(WAM)software.WhatisthebestdescriptionforwhatWAMi
Thereareseveraltypesofredundanttechnologiesthatcanbeputintoplace.Whattypeoftechnologyisshowninthegraphicth
ProtectionprofilesusedintheCommonCriteriaevaluationprocesscontainfiveelements.Whichofthefollowingestablishesthe
Anumberofmeasuresshouldbetakentohelpprotectdevicesandtheenvironmentfromelectricpowerissues.Whichofthefollow
OneofthefileserversinthedomainisaWindows2000ServercomputernamedEzonexamfiles.Ezonexamfilescontainsasharedfo
随机试题
A.风池、太冲、合谷、内关、后溪B.风池、百会、悬颅、侠溪、行间C.上星、头维、合谷,阿是穴D.百会、通天、行间、阿是穴E.率谷、太阳、侠溪、内庭治疗头痛肝阳上亢证,应首选()
以现代护理观为指导的护理工作应以()。
在自然环境现状调查中,下列不属于社会经济调查内容的是()。
建筑产品的多样性生产的单件性使得每项工程都要( )。
对于受托代理的资产和收到的捐赠资产,民间非营利组织都是最终的受益人。()
在确定绩效考评标准时,应做到“定量准确”,其衡量标准不包括()。
简述对《普通高中地理课程标准(实验)》中“地理学习评价要注重评价形式的多样化和针对性”这一评价建议的理解。(提示:从现实意义和评价方式等方面思考)
Englandisnotabigcountry:fromnorthtosouthandfromeasttowestitisonlyaboutthreehundredmilesacross.(76)Butfo
Forwhomisthepassageintendedto?Beforetheinterview,theapplicantshouldobtainsomeinformationabout______.
在这次表演中,所有的孩子都盛装打扮,轮流唱歌跳舞。
最新回复
(
0
)