首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
To compete in today’s fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitor
To compete in today’s fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitor
admin
2009-05-15
19
问题
To compete in today’s fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their internal enterprise networks. These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become(171). Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources to(172)activity. For many organizations, however, the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty-two percent of surveyed CISOs state that they currently use a moat and castle’s security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch(173)of service attacks or steal(174)information by snooping the network. As they access the corporate network, mobile and remote users inadvertently can infect the network with(175) and worms acquired from unprotected public networks. Hackers masquerading as internal users can take advantage of weak internal security to gain access to confidential information.
选项
A、damageable
B、susceptible
C、vulnerable
D、changeable
答案
C
解析
转载请注明原文地址:https://jikaoti.com/ti/ZgJ7FFFM
本试题收录于:
系统分析师上午综合知识考试题库软考高级分类
0
系统分析师上午综合知识考试
软考高级
相关试题推荐
Whichofthefollowingisconsideredthesecondgenerationofprogramminglanguages?
Whenanorganizationisunsureofthefinalnatureoftheproduct,whattypeofsystemdevelopmentmethodismostappropriatefo
Whichofthefollowingcorrectlybestdescribesanobject-orienteddatabase?
WhatwasthedirectpredecessortoStandardGeneralizedMarkupLanguage(SGML)?
Differentaccesscontrolmodelsprovidespecifictypesofsecuritymeasuresandfunctionalityinapplicationsandoperatingsyst
Virtualizationoffersmanybenefits.Whichofthefollowingincorrectlydescribesvirtualization?
YouaretheadministratorofaSQLServer2000computer.TheservercontainsaDataTransformationServices(DTS)packagethatq
当没有802.11b客户端在802.11b/g小区时,在AP的信标(beacon)中将会出现什么样的信息?A、NON_ERPpresent:yes;UseProtection:noB、NON_ERPpresent:no;UseProtectio
随机试题
A、Shelosesherpurse.B、Shehasaheadache.C、Shefeelstiredandsleepyallthetime.D、Sheisill.C
资产阶级革命派同改良派论战的焦点是()
A.后微动脉B.通血毛细血管C.动-静脉吻合支D.真毛细血管微循环中进行物质交换的主要场所是
银行结算账户一般分为()。
定向发行的债券可采取协议方式转让,也可经过中国证监会批准采取其他方式转让,最小转让单位不得少于面值30万元。( )
根据支付结算法律制度的规定,下列账户中,可以支取现金的有()。(2015年)
读水循环示意图,回答问题。如果人类取用水量超过水循环___________的数量与速度,或者使水资源遭受污染,就会造成水资源___________。
已知f(x)=Asin(ωx+φ)的部分图象如图所示,则y=f(x)的图象向右平移个单位后得到的图象解析式为()。
下列条目中,哪些是DBMS的基本功能?______。Ⅰ.提供用户对数据库结构的描述功能Ⅱ.提供用户对数据的操作功能Ⅲ.提供多用户环境下的事务管理Ⅳ.分类组织、存储和管理各种数据Ⅴ.数据库的创建、转储和恢复
•Youwillhearaconversationaboutqualitycontrol.•Foreachquestion23-30,markoneletter(A,BorC)forthecorrectans
最新回复
(
0
)