Deprecated: Creation of dynamic property Kirki\Field\Repeater::$compiler is deprecated in /home1/diywmcom/public_html/baifaqimei/wp-content/themes/blogstream/functions/kirki/kirki-packages/compatibility/src/Field.php on line 305
信息┊治理 – 第 4 页 – 白发齐眉

信息┊治理


Notice: 函数 WP_Object_Cache::add 的调用方法不正确。 缓存键不能为空字符串。 请查阅调试WordPress来获取更多信息。 (这个消息是在6.1.0版本添加的。) in /home1/diywmcom/public_html/baifaqimei/wp-includes/functions.php on line 5827

Notice: 函数 WP_Object_Cache::add 的调用方法不正确。 缓存键不能为空字符串。 请查阅调试WordPress来获取更多信息。 (这个消息是在6.1.0版本添加的。) in /home1/diywmcom/public_html/baifaqimei/wp-includes/functions.php on line 5827

CISA每日一题

Which of the following devices extends the network and has the capacity to store frames and act as a storage and forward device?

A.Router
B.Bridge
C.Repeater
D.Gateway

[hidden]
A bridge connects two separate networks to form a logical network (e.g., joining an Ethernet and token network) and has the storage capacity to store frames and act as a storage and forwarding device. Bridges operate at the OSI data link layer by examining the media access control header of a data packet. Routers are switching devices that operate at the OSI network layer by examining network addresses (i.e., routing information encoded in an IP packet). The router, by examining the IP address, can make intelligent decisions in directing the packet to its destination. Repeaters amplify transmission signals to reach remote devices by taking a signal from a LAN, reconditioning and retiming it, and sending it to another. This functionality is hardware-encoded and occurs at the OSI physical layer. Gateways provide access paths to foreign networks.
[/hidden]

CISA每日一题

The advantage of a bottom-up approach to the development of organizational policies is that the policies:

A. are developed for the organization as a whole.
B. are more likely to be derived as a result of a risk assessment.
C. will not conflict with overall corporate policy.
D. ensure consistency across the organization.

[hidden]
A bottom-up approach begins by defining operational-level requirements and policies, which are derived and implemented as the result of risk assessments. Enterprise-level policies are subsequently developed based on a synthesis of existing operational policies. Choices A, C and D are advantages of a top-down approach for developing organizational policies. This approach ensures that the policies will not be in conflict with overall corporate policy and ensure consistency across the organization.

[/hidden]

CISA每日一题

Which of the following is a dynamic analysis tool for the purpose of testing software modules?

A. Black box test
B. Desk checking
C. Structured walk-through
D. Design and code

[hidden]

A black box test is a dynamic analysis tool for testing software modules. During the testing of software modules a black box test works first in a cohesive manner as a single unit/entity consisting of numerous modules, and second with the user data that flows across software modules. In some cases, this even drives the software behavior. In choices B, C and D, the software (design or code) remains static and somebody closely examines it by applying his/her mind, without actually activating the software. Hence, these cannot be referred to as dynamic analysis tools.

[/hidden]