软题库 移动APP 扫码下载APP 随时随地移动学习 培训课程
当前位置:信管网 >> 在线考试中心 >> 信息系统项目管理师题库 >> 试题查看
试卷名称 2016年上半年数据库系统工程师考试上午真题试题(综合知识)
考试中心《2016年上半年数据库系统工程师考试上午真题试题(综合知识)》在线考试
试卷年份2016年上半年
试题题型【多选题】
试题内容

In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming,entering, or using. Permission to access a resource is called authorization(授权).
An access control mechanism(71)between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls; routers, files,and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is (72) to access the system at all.
Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(73) access. An auditing function monitors and keeps a record of user accesses to system resources. 
In practice, a number of(74)may cooperatively share the access control function. All Operating systems have at least a rudimentary(基本的).and in many cases a quite robust, access control component. Add-on security packages can add to the (75)access control capabilities of the OS. Particular applications .or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services .
(71)A.cooperates
B.coordinates
C.connects
D.mediates
(72)A.denied
B.permitted
C.prohibited
D.rejected
(73)A.open
B.monitor
C.grant
D.seek
(74)A.components
B.users
C.mechanisms       
D.algorithms
(75)A.remote
B.native
C.controlled
D.automated


相关试题

推荐文章
合作网站内容