单选题 Which of the following computer design approaches is based on the fact that in earlier technologies, the instruction fetch was the longest part of the cycle? 以下哪种计算机设计方法是基于以下事实:在早期技术中,取指令是周期中最长的部分?

A、 Pipelining 流水线
B、 Reduced Instruction Set Computers (RISC) 精简指令集计算机(RISC)
C、 Complex Instruction Set Computers (CISC) 复杂指令集计算机(CISC)
D、 Scalar processors标量处理器
下载APP答题
由4l***x2提供 分享 举报 纠错

相关试题

单选题 Which type of security control is also known as "Logical" control? 哪种类型的安全控制也称为“逻辑”控制?

A、 Physical 物理
B、 Technical 技术
C、 Administrative 行政的
D、 Risk风险

单选题 What does the * (star) integrity axiom mean in the Biba model? Biba模型中的*(星形)完整性公理是什么意思?

A、 No read up 不向上读
B、 No write down 不向下写
C、 No read down 不向下读
D、 No write up不向上写

单选题 Who is responsible for providing reports to the senior management on the effectiveness of the security controls? 谁负责向高级管理层报告安全控制的有效性?

A、 Information systems security professionals 资讯系统安全专家
B、 Data owners 数据所有者
C、 Data custodians 数据保管人
D、 Information systems auditors信息系统审计员

单选题 What is the appropriate role of the security analyst in the application system development or acquisition project? 在应用系统开发或收购项目中,安全分析师的适当角色是什么?

A、 policeman 警察
B、 control evaluator & consultant 控制评估师和顾问
C、 data owner 数据拥有者
D、 application user应用程序用户

单选题 The "vulnerability of a facility" to damage or attack may be assessed by all of the following except: “设施易受损坏或攻击的脆弱性”可通过以下所有方式进行评估,但以下情况除外:

A、 Inspection 检查
B、 History of losses 损失历史
C、 Security controls 安全控制
D、 security budget安全预算

单选题 What is used to protect programs from all unauthorized modification or executional interference? 什么用于保护程序免受所有未经授权的修改或执行干扰?

A、 A protection domain 保护域
B、 A security perimeter 警戒线
C、 Security labels 安全标签
D、 Abstraction 抽象

单选题 Why does compiled code pose more of a security risk than interpreted code? 为什么编译后的代码比解释后的代码更具安全风险?

A、 Because malicious code can be embedded in compiled code and be difficult to detect. 因为恶意代码可以嵌入到编译后的代码中,很难被检测到。
B、 If the executed compiled code fails, there is a chance it will fail insecurely. 如果执行的编译代码失败,则可能会不安全地失败。
C、 Because compilers are not reliable. 因为编译器不可靠。
D、 There is no risk difference between interpreted code and compiled code. 解释代码和编译代码之间没有风险差异。

单选题 Which of the following statements relating to the Biba security model is FALSE? 以下关于Biba安全模型的陈述中哪一项是错误的?

A、 It is a state machine model. 这是一个状态机模型。
B、 A subject is not allowed to write up. 一个主题是不允许写文章的。
C、 Integrity levels are assigned to subjects and objects. 完整性级别分配给主体和对象。
D、 Programs serve as an intermediate layer between subjects and objects. 程序是主体和客体之间的中间层。