首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
To compete in today’s fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitor
To compete in today’s fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitor
admin
2009-05-15
31
问题
To compete in today’s fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their internal enterprise networks. These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become(171). Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources to(172)activity. For many organizations, however, the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty-two percent of surveyed CISOs state that they currently use a moat and castle’s security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch(173)of service attacks or steal(174)information by snooping the network. As they access the corporate network, mobile and remote users inadvertently can infect the network with(175) and worms acquired from unprotected public networks. Hackers masquerading as internal users can take advantage of weak internal security to gain access to confidential information.
选项
A、damageable
B、susceptible
C、vulnerable
D、changeable
答案
C
解析
转载请注明原文地址:https://kaotiyun.com/show/smLZ777K
本试题收录于:
系统分析师上午综合知识考试题库软考高级分类
0
系统分析师上午综合知识考试
软考高级
相关试题推荐
利用快捷方式向导,在桌面上为应用程序“Word.exe”创建名为“WORD”的快捷方式,该应用程序的位置在“C:\ProgramFiles\MicrosoftOffice\OFFICEll\WINWORD.EXE"。
Maryiscreatingmaliciouscodethatwillstealauser’scookiesbymodifyingtheoriginalclient-sideJavascript.Whattypeof
Whatmarkuplanguageallowsforthesharingofapplicationsecuritypoliciestoensurethatallapplicationsarefollowingthes
______providesforavailabilityandscalability.Itgroupsphysicallydifferentsystemsandcombinesthemlogically,whichhelps
Whenanorganizationsplitsnamingzones,thenamesofitshoststhatareonlyaccessiblefromanintranetarehiddenfromtheI
Virtualizationoffersmanybenefits.Whichofthefollowingincorrectlydescribesvirtualization?
WhataretworesultsofenteringtheVESwitch(config)#vtpmodeclientcommandonaCatalystswitchintheEzonexamLAN?(Choose
ICMPisoftenusedintroubleshootingandverifyingnetwork.WhatstatementsaretrueregardingICMPpackets?(Choosetwo)A.Th
Inaswitchedenvironment,whatdoestheIEEE802.1Qstandarddescribe?
arestillbeingconductedin(),Besidesthe()forprocessanddataofcurrentsystem,
随机试题
A.心俞、脾俞、足三里B.曲池、神门、内庭C.合谷、阴陵泉、风池D.膈俞、内关痰火扰神所致的癫痫静息期除选主穴外还可配用
下列各项中不能当然引起委托代理关系终止的原因是:()
在建设产品生产中应用价值工程原理时,应()。
案例一[背景材料]某大型剧院拟进行维修改造,某装饰,装修工程在公开招标投标过程中获得了该维修改造任务,合同工期为5个月合同价格为1800万元。1.抹灰工程基层处理的施工过程部分记录如下:(1)在抹灰前对基层表面做了清除;
某企业发出存货采用加权平均法。2011年3月初库存甲商品200件,单位成本500元;3月购入甲商品1200件,单位成本500元。本月销售甲商品1000件。期末经实地盘点,查明甲商品实存为360件。企业财产物资的盘存制度有()。
甲于2018年3月5日向乙借款10万元,由丙作为连带责任保证人。三方约定:甲应于2019年3月5日之前偿还该借款。若本案中的当事人约定,保证期间截止于2019年2月1日,则丙承担保证责任的期间应截止于()。
《秋兴八景图》是__________的山水名作。
经常与任课教师取得联系,了解学生的学习情况:关心学生的身体健康与课余生活,指导学生参加劳动实践;经常与家长保持联系,互通情况,取得家长的支持与配合。以上所述属于班主任的()。
下列不属于物理设计的内容是
为防止计算机病毒传染,应该做到()。
最新回复
(
0
)