Reverse Engineering - Architecture Zhenti (20)

  1. Structured program design adopts top-down, step-by-step refinement and modular program design methods, and any single-entry single-exit program can be constructed through () three basic control structures.
  1. Order, selection and nesting
  2. Sequence, Branch and Loop
  3. Branching, Concurrency, and Loops
  4. Jump, selection and concurrency

Answer: B

Parse:

Structured design is a data flow-oriented design method, mainly architecture design, interface design, data design and process design .

  1. A software component is an independently deployable software unit, which is different from an object in program design, component().
  1. is an instance unit with a unique flag
  2. Containers can be used to manage their external visibility
  3. Use factory methods (such as constructors) to create your own instances
  4. A class element can be shared between

Answer: C

Parse:

Architecture features:

  1. independent deployment
  2. As a third-party assembly unit
  3. no externally visible state

Object properties:

  1. An instance unit, uniquely identified.
  2. May have transition state, not visible externally
  3. Encapsulate your own state and behavior.

  1. Software validation testing is also known as software validity testing, mainly verification ( ).
  1. Collaboration between various unit modules in the system
  2. Whether the software and hardware can be effectively integrated in the actual operating environment
  3. Whether the software function, performance and other features are consistent with user needs
  4. Whether the program module can correctly realize the requirements of function, performance and design constraints in the detailed design specification.

Answer: C

  1. Determine the test plan is usually completed in the requirements analysis phase, depending on the degree of user participation, the software to determine the test usually includes ().
  1. Black box testing and white box testing
  2. One-shot assembly testing and incremental assembly testing
  3. Internal Testing, ALPHA, BETA and Acceptance Testing
  4. Functional testing, performance testing, user interface testing and security testing

Answer: C

Parse:

The Alpha test is the development environment test, the internal employee users simulate the actual operating environment test, and the BETA test is the user's own real scene.

  1. ABSD is based on software architecture design, emphasizing the combination of business, quality and functional  requirements to drive software architecture design. It emphasizes views and perspectives to describe software architecture, and uses use cases and quality scenarios to describe requirements. Use cases describe functional requirements, and quality scenarios describe quality requirements.

  1. In network planning, network security protection equipment should be deployed between the government's internal and external networks. The device A deployed in the figure below is (), and the wrong description of the function of device A is ().

  1. IDS
  2. firewall
  3. Gatekeeper
  4. UTM

Answer C

  1. Dual-host system, even if the external network is paralyzed by hackers, it cannot affect the internal network
  2. Can prevent external active attacks
  3. Use dedicated hardware control technology to ensure real-time connection between internal and external networks
  4. Any response of the device to the external network is a response to the request of the internal network user

Answer: C

Parse:

IDS: Intrusion Detection System, which judges whether the behavior is abnormal through the user's request.

Firewall: It is used to isolate the internal and external networks.

Gatekeeper: Different from IDS and firewalls, the gatekeeper connects to the internal network and disconnects the external network. Connect to the external network and disconnect the internal network.

UTM: Refers to integration, intrusion detection, firewall, and gatekeeper integration functions should all be available.

  1. If Wang buys a painting, he enjoys ( ) of the work of art.
  1. copyright
  2. ownership
  3. Exhibition rights
  4. Ownership and its exhibition rights

Answer: D

  1. A variety of different technologies can be used in the construction of application systems, () can convert a certain form of software description into a higher-level abstract representation, and use the obtained information to () reconstruct or modify the existing system, A new version of the system is thus produced.
  1. Reverse Engineering
  2. system improvement
  3. design recovery
  4. reengineering

Answer: A

  1. Reverse Engineering
  2. system improvement
  3. design recovery
  4. reengineering

Answer: D

Guess you like

Origin blog.csdn.net/ke1ying/article/details/132643197