首页
财务会计
医药卫生
金融经济
考公考编
外语考试
学历提升
职称考试
建筑工程
IT考试
其他
登录
财务会计
共用题干 第二篇HackThe first big-name hackers
共用题干 第二篇HackThe first big-name hackers
昕玥
2019-12-17
7
问题
共用题干第二篇
Hack
The first big-name hackers include Steve Wozniak,Bill Gates and Linus Torvalds,all now highly recog-
nizable names behind many of the computer technologies used today. These early hackers had a love of tech-
nology and a compelling need to know how it all worked,and their goal was to push programs beyond what
they were designed to do.Back then,the word"hacker" didn't have the negative connotation it has today.
The original hacker ethic,rooted out of simple curiosity and a need to be challenged,appears to be dead.
The objectives of early hackers are a far cry from the goals of today'S hacker. The motivation of the new
breed of hackers appears not to be curiosity,or a hunger for knowledge,as it used to be.Instead,most of to-
day'S hackers are driven by greed,power,revenge,or some other malicious intent,treating hacking as a game
or sport,employing the tools that are retdily available via the Internet.
The rate of security attacks is actually outpacing the growth of the Internet.This means that something
besides the growth of the Internet is driving the rise in security attacks.Here are some realities you should
know about:Operating systems and applications will never be secure.New vulnerabilities will be introduced
into your environment every day.And even if you ever do get one operating system secure,there will be new
operating systems with new vulnerabilities一phones,wireless devices,and network appliances.Employees will
never keep up with security polices and awareness.It doesn't matter how much you train and educate your
employees.If your employees disregard warnings about the hazards of opening questionable e-mail attach-
ments,how are you going to educate them about properly configuring firewalls and intrusion detection systems
for their PCs?Managers have more responsibility than ever. And on top of the realities listed above,security
managers are being asked to support increasing degrees of network availability and access.There are some
good security measures you can take:Employ a layer 7,full-inspection firewall.Automatically update your
anti-virus at the gateway,server and client. Keep all of your systems and applications updated.Hackers com-
monly break into a website through known security holes,so make sure your servers and applications are
patched and up to date.Turn off unnecessary network services.Eliminate all unneeded programs.Scan net-
work for common backdoor services一use intrusion detection systems,vulnerability scans,anti-virus protection.
选项
Which of the following statements of Steve Wozniak,Bill Gates and Linus Torvalds is TRUE?A:They are all good examples of today's computer users.B:They are driven by greed,power,revenge,or some other malicious intent.C:Their goal is to push programs beyond what they are designed to do.D:They are all dead.
答案
C
解析
本题的相关信息在文章的第一段。Steve Wozniak , Bill Gates and Linus Torvalds都是一 些早期的著名黑客,不同于现今的黑客,他们出于好奇,勇于挑战计算机和网络科技的漏洞,并 以此推动计算机和网络科技的进步。 黑客指的是计算机和网络科技方面的专家,可以进人计算机系统,所以D是正确答案。 依据是第三段中“Employees will never keep up with security polices and awareness.It doesn't matter how much you train and educate your employees”。 文中与之相关的内容是第三段的“If your employees disregard warnings about the hazards of opening questionable e一mail attachments,how are you going to educate them about properly con- figuring firewalls and intrusion detection systems for their PCs?"。这与B项的意思不一致。 其依据是第三段倒数第三句“Turn off unnecessary network services.”即关闭不必要的网 络服务,而不是关闭所有的网络服务。一字之差,却相去甚远,要注意辨析。
转载请注明原文地址:https://ti.zuoweng.com/ti/4aOfKKKQ
相关试题推荐
B解题指导:题干图形的笔画数分别为4、5、6、7笔,所以应选择比划数为8笔的图形。故答案为B。
共用题干 3月1日,某经销商以1200元/吨的价格买入1000吨小麦。为了避免
共用题干 XYZ股票50美元时,某交易者认为该股票有上涨潜力,便以3.5美元的
共用题干 华天公司为上市公司,适用企业所得税税率25%,所得税采用资产负债表债
共用题干甲、乙两公司属同一集团,甲公司为上市公司,2010~2012年发生的与
共用题干甲、乙两公司属同一集团,甲公司为上市公司,2010~2012年发生的与
共用题干甲、乙两公司属同一集团,甲公司为上市公司,2010~2012年发生的与
共用题干甲、乙两公司属同一集团,甲公司为上市公司,2010~2012年发生的与
共用题干甲公司和乙公司均为增值税一般纳税人,适用的增值税税率均为17%。甲公司
共用题干甲公司和乙公司均为增值税一般纳税人,适用的增值税税率均为17%。甲公司
随机试题
红外热像检测一般检测要求中环境相对湿度不宜大于(____)%。
在土质路基填筑施工中,不同透水性质材料正确的组合方案有()。
人体处于下列哪个体位时,腰椎间盘承受的压力最大
下列哪一项不属于中间业务的特点?( )
董事、监事、高级管理人员非经()书面授权,不得对外发布上市公司未披露信息。
根据套利定价理论,套利组合满足的条件包括()。
关于贷款展期管理的说法错误的是( )。A.现行短期贷款的展期期限累计不得超过原贷款期限B.中期贷款的展期期限累计不得超过原贷款期期限的一半C.长期贷款
依物权客体性质可将物权区分为( )。A.自物权与他物权B.用益物权与担保物权C.动产物权与不动产物权D.主物权与从物权
《中华人民共和国药品管理法实施条例》规定,个人设置的门诊部、诊所等医疗机构不得A.配备常用药品和急救药品以外的其他药品B.配备常用药品和急救药品C.配备中成
某投资项目需在开始时一次性投资50000元,其中固定资产投资为45000元,营运资金垫资5000元,没有建设期。经营期各年现金净流量分别为:10000元、...