Most computersy stemsare(71)totwo differentgrou psofattacks:inside rattacksandoutsider attacks.Asystemthatisknowntobe(72)toanout

admin2014-11-11  41

问题 Most computersy stemsare(71)totwo differentgrou psofattacks:inside rattacksandoutsider
attacks.Asystemthatisknowntobe(72)toanoutsiderattackbypreventing(73)from outside
canstillbevulnerabletotheinsiderattacksaccomplishedbyabusiveusageof(74)users.Detecting
suchabusiveusageaswellasattacksbyoutsidesnotonlyprovidesinformationondamage
assessment,butalsohelpstopreventfutureattacks.Theseattacksareusually(75)bytools
referredtoasIntrusionDetectionSystems.
(75)

选项 A、searched
B、checked
C、tested
D、detected

答案D

解析 大部分计算机系统都很容易(vulnerable,脆弱的,易受攻击的)受到两种不同类型的攻击:来自内部的攻击和来自外部的攻击。一个系统可能通过禁止外部的访问(access,访问,接入)保证免受外部攻击,对于外部来说是安全的(secure),但是仍然容易受到因用户授权的(authorized)滥用而引起的内部攻击。检测这种用户授权的滥用和来自外部的攻击,不仅提供能评估损害的信息,而且也助于防止以后再受到攻击。这些攻击通常使用被称为入侵检测系统的工具检测(detected)出来。
转载请注明原文地址:https://kaotiyun.com/show/ZHRZ777K
0

最新回复(0)