首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
In the fields of physical security and information security,access control is the selective restriction of access to a place or
In the fields of physical security and information security,access control is the selective restriction of access to a place or
admin
2017-09-14
44
问题
In the fields of physical security and information security,access control is the selective restriction of access to a place or other resource.The act of accessing may mean consuming,entering,or using.Permission to access a resource is called authorization(授权).
An access control mechanism _______(1) between a user(or a process executing on behalf of a user)and system resources,such as applications,operating systems,firewalls,routers,files,and databases.The system must first authenticate(验证)a user seeking access.Typically the authentication function determines whether the user is ______(2) to access the system at all.Then the access control function determines if the specific requested access by this user is permitted.A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user.The access control function consults this database to determine whether to ______(3) access.An auditing function monitors and keeps a record of user accesses to system resources.
In practice,a number of ______(4) may cooperatively share the access control function.All operating systems have at least a rudimentary(基本的),and in many cases a quite robust,access control component.Add—on security packages can add to the __________(5) access control capabilities of the OS.Particular applications or utilities,such as a database management system,also incorporate access control functions.External devices,such as firewalls,can also provide access control services.
(4)
选项
A、components
B、users
C、mechanisms
D、algorithms
答案
A
解析
转载请注明原文地址:https://kaotiyun.com/show/WmTZ777K
本试题收录于:
数据库系统工程师上午基础知识考试题库软考中级分类
0
数据库系统工程师上午基础知识考试
软考中级
相关试题推荐
因为在软件开发的每一个环节都有可能产生意想不到的问题,所以(44)。
UML提供了4种结构图用于对系统的静态方面进行可视化、详述、构造和文档化。其中(112)是面向对象系统建模中最常用的图,用于说明系统的静态设计视图;当需要说明系统的静态实现视图时,应该选择(113);当需要说明体系结构的静态实施视图时,应该选择(114)。
Theprocessof(67)scheduleactivitydurationsusesinformationonscheduleactivityscopeofwork,requiredresourcetypes,estim
关于典型的大型、复杂信息系统项目,下列做法中,(1)是不正确的。
Theintentionofthe()istoschedule,organizeandcontrolallactivitiestoachievetheprojectgoaleventually.NomaRerh
在Windows操作系统平台上采用通用硬件设备和软件开发工具搭建的电子商务信息系统宜采用()作为信息安全系统架构。
Afteracceptanceandformaltransferofinformationsystemstocustomers,ithasenteredthestageof().
典型的信息系统项目开发的过程中,(1)阶段拟定了系统的目标、范围和要求,而系统各模块的算法一般在(2)阶段确定。(1)
防火墙把网络划分为几个不同的区域,一般把对外提供网络服务的设备(如WWW服务器、FTP服务器)放置于(26)区域。
Models drawn by the system analysts during the process of the structured analysis are(75)
随机试题
抛物面反射天线是反射天线中最常用的类型。()
患者女性,27岁,甲状腺肿大1年,消瘦,易疲劳,失眠,心悸,怕热,体重下降明显,心率110次/分,血压130/80mmHg,诊断为Graves病,主要护理问题是
经批准的规划是开发利用水资源和防治水害活动的(),规划和修改必须经原批准机关核准。
项目投资回收期在一定程度上显示了( )。
下列关于股份制商业银行的说法中,不正确的是()。
下列各项中,属于民事法律关系主体的有()。
下面属于黑盒测试方法的是()。
YouNeedCourageShortlyafterIbeganacareerinbusiness,IlearnedthatCarlWeatherup,presidentofPepsiCo(百事可乐公司),w
Weshouldalsoknowthat"greed"haslittletodowiththeenvironmentalcrisis.Thetwomaincausesarepopulationpressures,e
AnIndiananthropologist,ChandraThapar,madeastudyofforeigncultures,whichhadcustomssimilarto【C1】______ofhisnative
最新回复
(
0
)