1、系统分析师-13 及答案解析(总分:100.00,做题时间:90 分钟)一、单项选择题(总题数:6,分数:100.00)SOX is an alternative _ for XML. It is useful for reading and creating XML content in a _ editor. It is then easily transformed into proper XML. SOX was created because developers can spend a great deal of time with raw XML. For many of us,
2、 the popular XML_ have not reached a point where their tree views, tables and forms can completely substitute for the underlying _ language. This is not surprising when one considers that developers still use a text view, albeit enhanced, for editing other languages such as JavA. SOX uses _ to repre
3、sent the structure of an XML document, which eliminates the need for closing tags and a number of quoting devices. The result is surprisingly clear.(分数:20.00)A.semanticB.pragmaticsC.syntaxD.grammarA.graphicB.programC.commandD.textA.textsB.editorsC.creatorsD.tagsA.programmingB.commandC.markupD.intera
4、ctiveA.indentingB.structureC.frameworkD.bracketWith hundreds of millions of electronic _ taking place daily, businesses and organizations have a strong incentive to protect the _ of the data exchanged in this manner, and to positively ensure the _ of those involved in the transactions. This has led
5、to an industry-wide quest for better, more secure methods for controlling IT operations, and for deploying strong security mechanisms deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the imaginations of the security community h
6、as been the development of standards-based security _ that can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities in _ and integrating security provisions at the deepest levels of the machine operation has significant benefits for bo
7、th users and those responsible for securing IT operations.(分数:20.00)A.devicesB.transactionsC.communicationsD.businessesA.operationB.completenessC.integrityD.interchangeA.identitiesB.homogeneitiesC.creationsD.operationsA.appliancesB.chipsC.toolsD.meansA.softwareB.formC.computerD.siliconWLANs are incr
8、easingly popular because they enable cost-effective connections among people, applications and data that were not possible, or not cost-effective, in the past. For example, WLAN-based applications can enable free-grained management of supply and distribution _ to improve their efficienty and reduce
9、_. WLANs can also enable entirely new business processes. To cite but one example, hospitals are using WLAN-enabled point-of-care applications to reduce errors and improve overall _ care. WLAN management solutions provide a variety of other benefits that can be substantial but difficult to measure.
10、For example, they can protect corporate data by preventing _ through rogue access points. They help control salary costs, by allowing IT staffs to manage larger networks without adding staff. And they can improve overall network management by integrating with customers“ existing systems, such as Ope
11、n View and UniCenter. Fortunately, it isn“t necessary to measure these benefits to justify investing in WLAN management solutions, which can quickly pay for themselves simply by minimizing time-consuming. _ and administrative chores.(分数:15.00)A.choresB.chainsC.changesD.linksA.personelB.expensesC.ove
12、rheadD.hardwareA.financeB.patientC.affairD.doctorA.intrusionB.aggressionC.inbreakD.infallA.exploitationB.connectionC.departmentD.deploymentTo compete in today“s fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their inte
13、rnal enterprise networks. These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become _. Third parties can introduce risk in a variety of ways from connecting with an infected la
14、ptop to unauthorized access of network resources to _ activity. For many organizations, however, the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty-two percent of surveyed CISOs state that they currently use a moat and castle“s security approa
15、ch, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch _ of service attacks or steal _ information by snooping the network. As they access the corporate network, mobile and
16、 remote users inadvertently can infect the network with _ and worms acquired from unprotected public networks. Hackers masquerading as internal users can take advantage of weak internal security to gain access to confidential information.(分数:15.00)A.damageableB.susceptibleC.vulnerableD.changeableA.v
17、enomousB.maliciousC.feloniousD.villainousA.denialB.virtuousC.completeD.traverseA.reservedB.confidentialC.completeD.mysteriousA.sicknessB.diseaseC.virusesD.germsAn Enterprise Resource Planning (ERP) is built upon a commercial _ that promises the seamless _ of all the information flowing through the c
18、ompanyfinancial, accounting, human resources, supply chain and customer information. In implementation, all ERP systems include several features. The system is installed on a typical database management system. It requires initial setup according to the organization“s process, but it may be _accordi
19、ng to the organization“s unique process requirements through a tool set contained within the ERP applications. Using ERP, _ can be prescribed to automate approval processes through established chains of commanD. One of the methods used to effect rapid implementation of the ERP system is to conduct c
20、oncurrent _ sessions during the early stages of ERP implementation.(分数:15.00)A.operating systemB.middlewareC.software packageD.management systemA.associationB.connectionC.combinationD.integrationA.customizedB.madeC.manufacturedD.producedA.functionsB.processesC.informationD.workflowsA.JRPB.BPRC.RADD.
21、JADA project management technique that is currently in widespread use is the _. The purpose of this technique is to detail, in hierarchical fashion, all of the activities that are required to meet project objectives. There are some special activities called _, which are events that signify the accom
22、plishment or completion of major deliverables during the project. Most system development methodologies also provide _, whose purpose is to contain the various pieces of relevant information-feasibility assessments, schedules, needs analysis, and so forth-in a single place so that they can be presen
23、ted to project clients and other related parties. Several types of important network diagrams are used in project management. _was developed to make clear the interdependence between project tasks before those tasks are scheduled. _ offers the advantage of clearly showing overlapping tasks.(分数:15.00
24、)A.Functional decomposition diagramB.Work Breakdown StructureC.Structure ChartD.Organizational StructureA.feasibility checkpointsB.phasesC.iterationsD.milestonesA.baseline planB.project planningC.statement of workD.information system planningA.CPMB.Network DiagramC.PERTD.Gantt chartA.CPMB.Network Di
25、agramC.PERTD.Gantt chart系统分析师-13 答案解析(总分:100.00,做题时间:90 分钟)一、单项选择题(总题数:6,分数:100.00)SOX is an alternative _ for XML. It is useful for reading and creating XML content in a _ editor. It is then easily transformed into proper XML. SOX was created because developers can spend a great deal of time with r
26、aw XML. For many of us, the popular XML_ have not reached a point where their tree views, tables and forms can completely substitute for the underlying _ language. This is not surprising when one considers that developers still use a text view, albeit enhanced, for editing other languages such as Ja
27、vA. SOX uses _ to represent the structure of an XML document, which eliminates the need for closing tags and a number of quoting devices. The result is surprisingly clear.(分数:20.00)A.semanticB.pragmaticsC.syntax D.grammar解析:A.graphicB.programC.commandD.text 解析:A.textsB.editors C.creatorsD.tags解析:A.p
28、rogrammingB.commandC.markup D.interactive解析:A.indenting B.structureC.frameworkD.bracket解析:SOX 是另外一种 XML 语法,可以用它在文本编辑器中阅读和生成 XML 内容。它也很容易转换成适当的 XML 文档。SOX 的产生是由于开发人员在处理原始的 XML 文档时花费了大量的时间。对很多人来说,通常的 XML 编辑器还没有达到可以用树图、表格和窗体来完全代替基本标记语言的地步。这是很自然的,因为有些人认为开发人员还在使用文本界面编辑其他语言,例如,Java。SOX 使用了锯齿状缩进的方式来表示 XML
29、文档的结构,这就不需要使用括号和引号了,其结果是显而易见的。With hundreds of millions of electronic _ taking place daily, businesses and organizations have a strong incentive to protect the _ of the data exchanged in this manner, and to positively ensure the _ of those involved in the transactions. This has led to an industry-wi
30、de quest for better, more secure methods for controlling IT operations, and for deploying strong security mechanisms deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the imaginations of the security community has been the devel
31、opment of standards-based security _ that can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities in _ and integrating security provisions at the deepest levels of the machine operation has significant benefits for both users and thos
32、e responsible for securing IT operations.(分数:20.00)A.devicesB.transactions C.communicationsD.businesses解析:A.operationB.completenessC.integrity D.interchange解析:A.identities B.homogeneitiesC.creationsD.operations解析:A.appliancesB.chips C.toolsD.means解析:A.softwareB.formC.computerD.silicon 解析:每天发生上亿次的电子交
33、易,这使得商业机构产生了保护电子交易数据完整性和确认交易数据标识的迫切需求,从而导致整个行业都在探索更好更安全的控制 IT 操作的方法,探索在整个网络基础结构和客户设备中深入而广泛地部署增强的安全机制的方法。一种能够实现安全社区的有效设想是在客户机硬件中开发基于标准的安全芯片。在硅片中封装核心安全能力、在机器操作的最深层次集成安全设施的理论,对用户、对那些负责 IT 安全运营的人员都有极大的好处。WLANs are increasingly popular because they enable cost-effective connections among people, applicat
34、ions and data that were not possible, or not cost-effective, in the past. For example, WLAN-based applications can enable free-grained management of supply and distribution _ to improve their efficienty and reduce _. WLANs can also enable entirely new business processes. To cite but one example, hos
35、pitals are using WLAN-enabled point-of-care applications to reduce errors and improve overall _ care. WLAN management solutions provide a variety of other benefits that can be substantial but difficult to measure. For example, they can protect corporate data by preventing _ through rogue access poin
36、ts. They help control salary costs, by allowing IT staffs to manage larger networks without adding staff. And they can improve overall network management by integrating with customers“ existing systems, such as Open View and UniCenter. Fortunately, it isn“t necessary to measure these benefits to jus
37、tify investing in WLAN management solutions, which can quickly pay for themselves simply by minimizing time-consuming. _ and administrative chores.(分数:15.00)A.choresB.chains C.changesD.links解析:A.personelB.expensesC.overhead D.hardware解析:A.financeB.patient C.affairD.doctor解析:A.intrusion B.aggressionC
38、.inbreakD.infall解析:A.exploitationB.connectionC.departmentD.deployment 解析:在过去,应用和数据难以获得或者获得的成本很高,现在,WLAN 因为能使人们之间互连的性价比很高,而得到了广泛的应用。例如,基于 WLAN 的应用能使供应链得到很好的管理,提高效率并减少经费开支。WLAN 使新的业务流程成为可能。一个例子是,医院正在使用基于 WLAN 的护理点应用,以便减少错误,改进对病人的全面护理工作。WLAN 管理方案提供了一系列的其他好处,这些好处是很实在的,但是又难以度量。例如,它可以防止通过欺诈访问点的方式的入侵,以保护企业
39、数据。WLAN 允许 IT 团队在不增加人员的基础上管理更大的网络,从而有助于控制薪水开支。WALN 通过集成客户已有的系统,例如,OpenView 和 UniCenter 等,有助于加强全面网络管理。幸运的是,我们不必度量这些好处来证明对 WLAN管理方案的投资是正确的,WLAN 管理方案只需使耗时的部署工作和事务性工作得以最小化,就可以很快得到补偿。To compete in today“s fast-paced competitive environment, organizations are increasingly allowing contractors, partners, v
40、isitors and guests to access their internal enterprise networks. These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become _. Third parties can introduce risk in a variety of w
41、ays from connecting with an infected laptop to unauthorized access of network resources to _ activity. For many organizations, however, the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty-two percent of surveyed CISOs state that they currently
42、use a moat and castle“s security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch _ of service attacks or steal _ information by snooping the network. As they a
43、ccess the corporate network, mobile and remote users inadvertently can infect the network with _ and worms acquired from unprotected public networks. Hackers masquerading as internal users can take advantage of weak internal security to gain access to confidential information.(分数:15.00)A.damageableB
44、.susceptibleC.vulnerable D.changeable解析:A.venomousB.malicious C.feloniousD.villainous解析:A.denial B.virtuousC.completeD.traverse解析:A.reservedB.confidential C.completeD.mysterious解析:A.sicknessB.diseaseC.viruses D.germs解析:为了适应当今的快速竞争环境,组织正逐步允许承包商、合作伙伴、访问者和顾客访问它们的企业内部网络,这些用户可以在会议室或办公室通过有线端口连接网络,或者通过无线访问
45、点。在这种允许第三方进行的开放式访问中,局域网变得难以防护。第三方可能以各种方式带来风险,从用一台受感染的膝上型电脑到连接未授权访问的网络资源进行恶意活动。然而,对很多组织而言,考虑到操作的复杂性和保证系统安全的成本,第三方网络访问是禁止的。接受调查的注册信息安全管理人员中,有 52%的人表示他们目前使用防火墙,而且承认在内部的防御措施是脆弱的。来自内部用户的威胁也正逐步成为安全考虑的一个因素。怀有恶意的员工可能发起拒绝服务攻击或者通过窥探网络窃取机密信息。当移动的和远程的用户访问网络时,他们一不小心就会使网络感染来自未受保护的公众网络的病毒和蠕虫。黑客伪装成内部用户,会利用脆弱的内部安全获得
46、访问机密信息的权限。An Enterprise Resource Planning (ERP) is built upon a commercial _ that promises the seamless _ of all the information flowing through the companyfinancial, accounting, human resources, supply chain and customer information. In implementation, all ERP systems include several features. The
47、system is installed on a typical database management system. It requires initial setup according to the organization“s process, but it may be _according to the organization“s unique process requirements through a tool set contained within the ERP applications. Using ERP, _ can be prescribed to autom
48、ate approval processes through established chains of commanD. One of the methods used to effect rapid implementation of the ERP system is to conduct concurrent _ sessions during the early stages of ERP implementation.(分数:15.00)A.operating systemB.middlewareC.software package D.management system解析:A.associationB.connectionC.combinationD.integration 解析:A.customized B.madeC.manufacturedD.produced解析:A.functionsB.processesC.informationD.workflows 解析:A.JRPB.BPR C.RADD.JAD解析:企业资源计划(ERP)是在一个商用软件包上建立起来的,这个软件包保证了企业中信息流(金融、财务、人力资源、供应链和客户信息)的无缝集成。在实现阶段,所有的 ERP 都有这些特征:系统被安装在一个典型的数据库管理系统上;根据企业的流程进行初步设置,但是