首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
To compete in today’s fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitor
To compete in today’s fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitor
admin
2009-05-15
23
问题
To compete in today’s fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their internal enterprise networks. These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become(171). Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources to(172)activity. For many organizations, however, the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty-two percent of surveyed CISOs state that they currently use a moat and castle’s security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch(173)of service attacks or steal(174)information by snooping the network. As they access the corporate network, mobile and remote users inadvertently can infect the network with(175) and worms acquired from unprotected public networks. Hackers masquerading as internal users can take advantage of weak internal security to gain access to confidential information.
选项
A、reserved
B、confidential
C、complete
D、mysterious
答案
B
解析
转载请注明原文地址:https://jikaoti.com/ti/MqJ7FFFM
本试题收录于:
系统分析师上午综合知识考试题库软考高级分类
0
系统分析师上午综合知识考试
软考高级
相关试题推荐
Samplanstoestablishmobilephoneserviceusingthepersonalinformationhehasstolenfromhisformerboss.Whattypeofiden
Whattypeoftelecommunicationtechnologyisillustratedinthegraphicthatfollows?
TwocommonlyusednetworkingprotocolsareTCPandUPD.Whichofthefollowingcorrectlydescribesthetwo?
Thefollowingscenarioappliestoquestions30,31,and32.Operatingsystemshaveevolvedandchangedovertheyears.Theearli
Whichofthefollowingbestdefinesavirtualmachine?
VirtualstoragecombinesRAMandsecondarystorageforsystemmemory.Whichofthefollowingisasecurityconcernpertainingto
CrimePreventionThroughEnvironmentalDesign(CPTED)isadisciplinethatoutlineshowtheproperdesignofaphysicalenvironm
YouaretheadministratorofaSQLServer2000computer.TheservercontainsadatabasenamedAccounting.Thedatafilesarecon
YouaretheadministratorofaSQLServer2000computer.Youcreateseveraljobsontheserverandschedulethemtorunduringt
Youareworkinginadatacenterenvironmentandareassignedtheaddressrange10.188.31.0/23.YouareaskedtodevelopanIPad
随机试题
Theyhavebeenchargedwith______gunsandexplosives.
下列描述中,不符合Burkitt淋巴瘤的是
土地勘测定界查权属调查的程序中,土地登记资料中需审核的内容不包括()。
生态是指()之间的关系。
下列经营项目中,应纳营业税的有()。
【2013年枣庄市市中区真题】提高学生知识储备的数量与质量可以从()方面人手。
“两个共同”是新世纪新阶段民族工作的主题,“两个共同”是指()。
A、 B、 C、 D、 B由题干第一、二个图形可确定为B项,如图所示
领导权力来自两个方面:职务权力和职务外的个人因素。那么以下四种类型的权力中属于个人权力的是()
“当然,物质和意识的对立,也只是在非常有限的范围内才有绝对的意义。”这里讲的“有限的范围内”是指
最新回复
(
0
)