首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
The government’s new cyber-security officials yesterday asked telecommunications companies for help in building a government com
The government’s new cyber-security officials yesterday asked telecommunications companies for help in building a government com
admin
2015-06-27
35
问题
The government’s new cyber-security officials yesterday asked telecommunications companies for help in building a government computer network that would have "no risk of outside penetration" — a task some computer security consultants say is nearly impossible. Plans for the private network, called Govnet, hinge on whether a reliable network infrastructure can be built at an affordable price, officials said. Computer system consultants said they could not estimate how much the network would cost because of the government’s enormous size and security needs. Richard Clarke, who was appointed special adviser to the president for cyberspace security this week, said he believes a more reliable system can be built. Ninety percent of available fiber-optic space is unused and fairly inexpensive to obtain, he said.
Govnet is part of a plan Clarke announced earlier this week "to secure our cyberspace from a range of possible threats, from hackers to criminals to terrorist groups, to foreign nations, which might use cyber-war against us in the future". Govnet would be completely independent from the Internet to help keep out hackers and viruses, according to the government’s plan. The request from the General Services Administration asks that telecommunications companies submit proposals about how the network could be built, how much it would cost, and how long it would take to construct.
This year, the current network has been breached by hackers, computer worms and viruses. The system was also roughed up by the "Code Red" computer worm and an attack program called "I Love You". The viruses affected thousands of government computers. Last year a report by the General Accounting Office, an internal government watchdog, found weaknesses in the computer network that could allow terrorists or hackers to " severely damage or disrupt national defense or vital public operations or steal sensitive data". Clarke said the government’s current virtual private network is vulnerable to viruses and denial of service attacks that Govnet would make more difficult to execute.
An internal network, such as the Govnet proposal, is worth investigating but will probably fall to sophisticated hackers, said Amit Yoran, chief executive of the security-services company Riptech Inc. and a former information-security program director at the Defense Department. "It is probably more feasible to implement and strongly enforce global security postures and practices rather than go out and purchase new assets, " Yoran said. "Once someone is able to get in, they will find a weak link. When you have a network the size of the government’s there will be weak links. Someone will get in. "
How will Govnet achieve its intended goal of enhancing the security of the government network?
选项
A、By stepping up its virus-killing software.
B、By scanning for viruses and attacks constantly.
C、By secluding itself from the Internet.
D、By establishing an internal watchdog committee.
答案
C
解析
第二段第二句提到,Govnet将完全脱离互联网,以防止黑客和病毒的袭击,由此可知答案为[C]。
转载请注明原文地址:https://jikaoti.com/ti/lIKMFFFM
0
专业英语四级
相关试题推荐
What’sthedoctors’attitudetowardBritishcouplesplanningtohavemillenniumbabies?
Executivecoachingisprimarilyconcernedwithconfidentialone-to-onediscussionsbetweenthecoachandtheexecutive.Itisai
Executivecoachingisprimarilyconcernedwithconfidentialone-to-onediscussionsbetweenthecoachandtheexecutive.Itisai
Norrishasdecidedto______forsomeeveningclassesnexttermnowthathehassettleddowninNewYork.
Whatisthemostprobablerelationshipbetweenthetwospeakers?
Oneofthegoodthingsformeninwomen’sliberationisthatmennolongerhavetopaywomentheold-fashionedcourtesies.
Jack________fromhomefortwodaysnow,andIambeginningtoworryabouthissafety.
Whenpeopledonot______toanacceptablestandardofbehavior,theyareboundtooffendotherpeople.
Thekeytopleasantmusicmaybethatitpleasesourneurons.Anewmodelsuggeststhat【C1】______musicalintervalstriggerarhy
______thehelpofmyEnglishteacher,Iwouldnothavesucceededinthespeechcontest.
随机试题
陆游著名诗句“夜阑卧听风吹雨,铁马冰河入梦来”出自()
女,23岁。腹胀、腹痛3个月,近1个月发热、盗汗。查体:移动性浊音(+)。腹水常规:比重1.018,蛋白定量37g/L,白细胞580×106/L,淋巴细胞0.80。HBsAg(+),肝功能正常。最可能的疾病是
不属于市域城乡空间一般划分内容的是()。
采用仲裁方式解决合同纠纷的原则是()。
商业助学贷款的住宿费和生活费可按学费支付期发放,也可分列发放。
下列选项属于人力资源需求定性预测方法的有( )。
黑龙江人吃蔬菜有两种形式,其中一种是蘸酱菜,有的源于俄罗斯,有的源于齐鲁,另一种是()。
某乡镇对集贸市场36种食品进行检查,发现超过保质期的7种,防腐添加剂不合格的9种,产品外包装标识不规范的6种。其中,两项同时不合格的5种,三项同时不合格的2种。问三项全部合格的食品有多少种?
甲于1998年1月犯盗窃罪(盗窃金额5000元),在公安机关立案侦查后逃亡外地,又于2004年4月犯抢劫罪。关于甲的行为说法正确的是()
Therewereonlyafew(survive)_____fromtheaircrash.
最新回复
(
0
)