首页
财务会计
医药卫生
金融经济
考公考编
外语考试
学历提升
职称考试
建筑工程
IT考试
其他
登录
职称考试
共用题干 第二篇HackThe first big-name hackers include Steve Wozniak,Bill Gates and ...
共用题干 第二篇HackThe first big-name hackers include Steve Wozniak,Bill Gates and ...
admin
2020-12-24
1
问题
共用题干
第二篇
Hack
The first big-name hackers include Steve Wozniak,Bill Gates and Linus Torvalds,all now highly recog-
nizable names behind many of the computer technologies used today. These early hackers had a love of tech-
nology and a compelling need to know how it all worked,and their goal was to push programs beyond what
they were designed to do.Back then,the word"hacker" didn't have the negative connotation it has today.
The original hacker ethic,rooted out of simple curiosity and a need to be challenged,appears to be dead.
The objectives of early hackers are a far cry from the goals of today'S hacker. The motivation of the new
breed of hackers appears not to be curiosity,or a hunger for knowledge,as it used to be.Instead,most of to-
day'S hackers are driven by greed,power,revenge,or some other malicious intent,treating hacking as a game
or sport,employing the tools that are retdily available via the Internet.
The rate of security attacks is actually outpacing the growth of the Internet.This means that something
besides the growth of the Internet is driving the rise in security attacks.Here are some realities you should
know about:Operating systems and applications will never be secure.New vulnerabilities will be introduced
into your environment every day.And even if you ever do get one operating system secure,there will be new
operating systems with new vulnerabilities一phones,wireless devices,and network appliances.Employees will
never keep up with security polices and awareness.It doesn't matter how much you train and educate your
employees.If your employees disregard warnings about the hazards of opening questionable e-mail attach-
ments,how are you going to educate them about properly configuring firewalls and intrusion detection systems
for their PCs?Managers have more responsibility than ever. And on top of the realities listed above,security
managers are being asked to support increasing degrees of network availability and access.There are some
good security measures you can take:Employ a layer 7,full-inspection firewall.Automatically update your
anti-virus at the gateway,server and client. Keep all of your systems and applications updated.Hackers com-
monly break into a website through known security holes,so make sure your servers and applications are
patched and up to date.Turn off unnecessary network services.Eliminate all unneeded programs.Scan net-
work for common backdoor services一use intrusion detection systems,vulnerability scans,anti-virus protection.
选项
Which of the following is NOT true of security attacks?
A:Employees will keep up with security polices and awareness if they are highly-trained.
B:The rate of security attacks appears faster than the growth of the Internet.
C:One's computer system will never be secure.
D:Vulnerabilities can go through phones,wireless devices,and network appliances.
答案
A
解析
本题的相关信息在文章的第一段。Steve Wozniak , Bill Gates and Linus Torvalds都是一 些早期的著名黑客,不同于现今的黑客,他们出于好奇,勇于挑战计算机和网络科技的漏洞,并 以此推动计算机和网络科技的进步。
黑客指的是计算机和网络科技方面的专家,可以进人计算机系统,所以D是正确答案。
依据是第三段中“Employees will never keep up with security polices and awareness.It doesn't matter how much you train and educate your employees”。
文中与之相关的内容是第三段的“If your employees disregard warnings about the hazards of opening questionable e一mail attachments,how are you going to educate them about properly con- figuring firewalls and intrusion detection systems for their PCs?"。这与B项的意思不一致。
其依据是第三段倒数第三句“Turn off unnecessary network services.”即关闭不必要的网 络服务,而不是关闭所有的网络服务。一字之差,却相去甚远,要注意辨析。
转载请注明原文地址:https://ti.zuoweng.com/ti/O0lQKKKQ
相关试题推荐
共用题干 SkinCancerMelanoma(黑素瘤),thedeadliestkindofskincancer,isnowthem...
共用题干 SkinCancerMelanoma(黑素瘤),thedeadliestkindofskincancer,isnowthem...
共用题干 SkinCancerMelanoma(黑素瘤),thedeadliestkindofskincancer,isnowthem...
共用题干 IKnowJustHowYouFeelDoyoufeelsad?Happy?Angry?Youmaythinkthat...
共用题干 IKnowJustHowYouFeelDoyoufeelsad?Happy?Angry?Youmaythinkthat...
共用题干 第三篇TheIcemanOnaSeptemberdayin1991,twoGermanswereclimbingthem...
共用题干 第三篇TheIcemanOnaSeptemberdayin1991,twoGermanswereclimbingthem...
共用题干 第三篇TheIcemanOnaSeptemberdayin1991,twoGermanswereclimbingthem...
共用题干 第二篇CTScansandLungCancerSmallorslow-growingnodules(小结节)discovered...
共用题干 第二篇CTScansandLungCancerSmallorslow-growingnodules(小结节)discovered...
随机试题
按照贷款品种划分,个人贷款主要分为()。 A.个人投资贷款 B.个人住房贷款
对免疫性结膜炎的药物治疗,叙述不正确的是 A.局部使用糖皮质激素可减轻症状,可
明确提出根据疾病性质和临床需要选择药物剂型的著作是()
下列属于期间费用的有()。
下列不属于境外上市外资股的特点的是()。A.记名股票B.外币认购买卖C.人民币标明股票面值D.公司支付股利时以外币计价
靶向制剂应具备的要求是A:定位、浓集、无毒可生物降解B:浓集、控释、无毒可生物降解C:定位、浓集、控释、无毒可生物降解D:定位、控释、可生物降解E:定位
患者恶寒喜暖,手足不温,口淡不渴,小便清长,舌淡苔白,脉迟缓,属A.表寒证B.里寒证C.太阳中风证D.外寒内热证E.阴盛格阳
根据《工程造价咨询企业管理办法》,工程造价咨询企业设立的分支机构不得以自己名义进行的工作有( )。A.承接工程造价咨询业务B.订立工程造价咨询合同C.委托
下列各项中,不属于中级人民法院管辖第一审的行政案件是:A、海关处理的案件B、对国务院部门所做的行政行为提起诉讼的案件C、对县级以上地方人民政府所做的行政
销售的预测方法有:A.简单平均法B.加权平均法C.简单移动平均法D.加权移动平均法E.指数平滑法