单选题 Which of the following computer design approaches is based on the fact that in earlier technologies, the instruction fetch was the longest part of the cycle? 以下哪种计算机设计方法是基于以下事实:在早期技术中,取指令是周期中最长的部分?
相关试题
单选题 Which type of security control is also known as "Logical" control? 哪种类型的安全控制也称为“逻辑”控制?
单选题 What does the * (star) integrity axiom mean in the Biba model? Biba模型中的*(星形)完整性公理是什么意思?
单选题 Who is responsible for providing reports to the senior management on the effectiveness of the security controls? 谁负责向高级管理层报告安全控制的有效性?
单选题 What is the appropriate role of the security analyst in the application system development or acquisition project? 在应用系统开发或收购项目中,安全分析师的适当角色是什么?
单选题 The "vulnerability of a facility" to damage or attack may be assessed by all of the following except: “设施易受损坏或攻击的脆弱性”可通过以下所有方式进行评估,但以下情况除外:
单选题 What is used to protect programs from all unauthorized modification or executional interference? 什么用于保护程序免受所有未经授权的修改或执行干扰?
单选题 Why does compiled code pose more of a security risk than interpreted code? 为什么编译后的代码比解释后的代码更具安全风险?
单选题 Which of the following statements relating to the Biba security model is FALSE? 以下关于Biba安全模型的陈述中哪一项是错误的?