問題詳情
40 關於惡意軟體(Malware),下列何者不屬於惡意程式碼物件(Malicious code objects)?
(A)分散式阻斷攻擊(DDoS)
(B)病毒(Virus)
(C)蠕蟲(Worm)
(D)木馬(Trojan horse)
(A)分散式阻斷攻擊(DDoS)
(B)病毒(Virus)
(C)蠕蟲(Worm)
(D)木馬(Trojan horse)
參考答案
無參考答案
內容推薦
- 39 關於存取控制(Access Control),下列何者不屬於存取控制的基本概念?(A)檢證(Accountability) (B)認證(Authentication) (C)匿名(Anonymi
- 38 關於無線網路安全協定(Wireless Security Protocols),下列敘述何者正確?(A) SSL 與 SSH 都是無線網路安全協定 (B) SSH 與 WPA 都是無線網路安全協
- 36 若兩關聯表(Relation)S1(A,B,C,D)及 S2(E,F,G,H)中,存在以下兩個功能相依(Functional Dependency)FD1:{C}→{D}及 FD2:{F}→{G
- 37 關於網路狀態,指令 X 可用來追蹤網際網路通訊協定(IP)封包傳遞的路徑,指令 Y 可測試封包能否透過 IP 協定到達特定主機。下列敘述何者正確? (A) X = netstat, Y = tr
- 33 執行以下程式片段後,下列敘述何者正確? (A) b[1]的值是 12 (B) b[2]的值是 8 (C) b[3]的值是 6 (D) b[4]的值是 10
- 由10,x,20等3個觀測值所算出的平均數為12,試問x的值是多少?(A) 2 (B) 4 (C) 6 (D) 8
- 35 若欲列出資料庫中員工資料表(Employee)內所有不同職級(Rank)名稱,下列 SQL 敘述何者正確?(A) SELECT Rank (DIFFERENT) FROM Employee; (
- 2 下列何者是 R 3 之子空間(subspace)?(A) W = {(x1 , x2 ,1) : x1 , x2 ∈ R} (B) W = {( x1 , x2 , x1 x2 ) : x1 ,
- 【題組】18 According to the passage, which of the following statements is NOT true?(A)Immigrants from ar
- 【題組】19 When was a Polish family most likely to immigrate to Vancouver?(A)Before World War I. (B)Sinc
內容推薦
- 下列程式是 C 語言的 function,請問呼叫 g2(210,42,350)會得到多少? (A) 42 (B) 14 (C) 10 (D)7
- 2 The government is to sign an_______with U.S. government for preventing the criminals from travelli
- 3________of heart attack include chest pain, cold sweating and nausea, developing into trouble breat
- 4 Many citizens view the rapid influx of immigrants with anxiety, worrying that the nation might fai
- 7 To follow a Mediterranean-style diet, which include high consumption of olive oil, fruits, and veg
- 6 ______the truth during an immigration inspection is a violation of Immigration Act and thus punish
- 8 After several rounds of recruitment, a number of potential candidates finally _________as the pres
- 10 The major argument against immigration is that so many migrants fail to _________with the local c
- 請依下文回答第 11 題至第 15 題:For United States Government personnel abroad to host a banquet, round tables of
- 請依下文回答第 16 題至第 20 題:Since the 1980s, immigration has drastically increased, making the city more eth
- 【題組】17 According to the first paragraph, which of the following statements is true?(A)Since the 1980
- 【題組】18 According to the passage, which of the following statements is NOT true?(A)Immigrants from ar
- 5 A visitor visa holder will be allowed to travel to Taiwan before the_____ of the visa.(A)expiratio
- 【題組】19 When was a Polish family most likely to immigrate to Vancouver?(A)Before World War I. (B)Sinc
- 12 下列有關軟體工程的軟體開發過程的敘述,何者錯誤?(A)軟體生命週期(lifecycle)的開發程序(development process),包含分析(analysis)、設計(design)、
- 13 下列有關資訊安全的敘述,何者錯誤?(A)偽裝(Masquerading)攻擊,是威脅到完整性(integrity) (B)封包過濾防火牆(Packet-filter firewall)是基於應用
- 15 假如某部電腦的 IP 為 166/26,那麼它所在的子網路的 IP 範圍應是?(A) 10 ~ 1255 (B) 10 ~
- 14 下列電腦系統元件中,何者資料存取速度最快?(A)隨機存取記憶體(RAM) (B)暫存器(Register) (C) SATA 硬碟(SATA Disk) (D)快取記憶體(Cache Memor
- 16 數位簽章(digital signature)無法提供下列那一個功能? (A)訊息的機密性(confidentiality) (B)訊息的完整性(integrity) (C)訊息的身分認證(au
- 17 根據 TCP/IP 通訊協定(protocol suite),下列敘述何者錯誤?(A) TCP 與 UDP 都是傳輸層(transport layer)的協定 (B)網路層(network la
- 19 下列那種技術,使用隧道協定(tunneling protocol)以及安全的程序,使得即使透過公共的骨幹網路進行網路連線,仍能維持其私密性(privacy)? (A) NAT (B) DHCP
- 18 下列那一種威脅,並不是採取直接攻擊電腦,而是一種非法取得敏感資料(例如信用卡號,帳號密碼)的方式? (A)病毒(Virus) (B)阻斷服務(Denial of Service) (C)網路釣魚
- 20 已知變數 X 是十進位,若 (77)8 + (X)10 = ( 3F )16 + ( 42 )16,求 X =?(A) 44 (B) 55 (C) 66 (D) 77
- 21 定義霍夫曼編碼(Huffman encoding)規則為 00 – A, 11 – E, 010 – T, 0110 – C, 0111 – L, 1000 – S,1011 – R, 1001
- 某醫院(醫療保健服務業)僱用勞工人數 215 人,應如何置管理人員? (A)職業安全衛生業務主管 1 人、職業安全管理師及勞工衛生管理師各 1 人以上(B)職業安全衛生業務主管 1 人(C)職業安