首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
To compete in today’s fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitor
To compete in today’s fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitor
admin
2009-05-15
21
问题
To compete in today’s fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their internal enterprise networks. These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become(171). Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources to(172)activity. For many organizations, however, the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty-two percent of surveyed CISOs state that they currently use a moat and castle’s security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch(173)of service attacks or steal(174)information by snooping the network. As they access the corporate network, mobile and remote users inadvertently can infect the network with(175) and worms acquired from unprotected public networks. Hackers masquerading as internal users can take advantage of weak internal security to gain access to confidential information.
选项
A、venomous
B、malicious
C、felonious
D、villainous
答案
B
解析
转载请注明原文地址:https://jikaoti.com/ti/egJ7FFFM
本试题收录于:
系统分析师上午综合知识考试题库软考高级分类
0
系统分析师上午综合知识考试
软考高级
相关试题推荐
Thefollowingscenariowillbeusedforquestions26,27,and28.Trentisthenewmanagerofhiscompany’sinternalsoftwarede
Whichofthefollowingisacorrectdescriptionoftheprosandconsassociatedwiththird-generationprogramminglanguages?
Whichofthefollowingisnotconsideredacountermeasuretoportscanningandoperatingsystemfingerprinting?
Whattypeoftelecommunicationtechnologyisillustratedinthegraphicthatfollows?
Beforeaneffectivephysicalsecurityprogramcanberolledout,anumberofstepsmustbetaken.Whichofthefollowingstepsc
YouaretheadministratorofaWindows2000ProfessionalcomputernamedComputer1.Computer1hasasharedcolorlaserprinterna
SplithorizonhasbeenenabledwithintheEzonexamroutednetwork.Whichoneofthefollowingstatementsbestexplainsthesplit
Beforeinstallinganew,upgradedversionoftheIOS,whatshouldbecheckedontherouter,andwhichcommandshouldbeusedto
One study conducted by a psychologist(121)of interviewing workers before and after the installation of a robot. The robot was us
随机试题
1930年8月,国民党民主人士邓演达领导成立的中间党派是()
DespiteDenmark’smanifestvirtues,DanesnevertalkabouthowproudtheyaretobeDanes.ThiswouldsoundweirdinDanish.Whe
被告人刘某在案件审理期间死亡,法院作出终止审理的裁定。其亲属坚称刘某清白,要求法院作出无罪判决。对于本案的处理,下列哪些选项是正确的?(2013年卷二第74题)
投资人是出资人也是受益人,可以是法人也可以是自然人,大的投资者往往也是发起人。()
根据《生产安全事故报告和调查处理条例》的规定,事故调查组应当自事故发生之日起()日内提交事故调查报告。
材料:东东有一双系鞋带的鞋子,他非常喜欢,但是他自己不会系。午睡起床时,他怎么也系不好鞋带,又着急又难过。华老师安慰他:“别着急!老师教你,你一定能学会的。”华老师边讲解,边示范,教了几遍,但是东东还是没学会。华老师知道这是因为东东性子急,观察不
德国心理学家苛勒采用“接竿实验”和“叠箱实验”对黑猩猩的问题解决行为进行了一系列的研究,从而提出了学习的()
不具有结构性、系统性、简约性等特点的课程是()。
战时窝藏逃离部队军人罪与窝藏罪的主要区别是什么?
偶然防卫是指客观上被害人正在或者即将对被告人或他人的人身进行不法侵害,但被告人主观上没有认识到这一点,出于非法侵害的目的而对被害人使用了武力,客观上起到了人身防卫的效果。根据上述定义.下列行为不属于偶然防卫的一项是?
最新回复
(
0
)