首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
To compete in today’s fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitor
To compete in today’s fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitor
admin
2009-05-15
34
问题
To compete in today’s fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their internal enterprise networks. These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become(171). Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources to(172)activity. For many organizations, however, the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty-two percent of surveyed CISOs state that they currently use a moat and castle’s security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch(173)of service attacks or steal(174)information by snooping the network. As they access the corporate network, mobile and remote users inadvertently can infect the network with(175) and worms acquired from unprotected public networks. Hackers masquerading as internal users can take advantage of weak internal security to gain access to confidential information.
选项
A、damageable
B、susceptible
C、vulnerable
D、changeable
答案
C
解析
转载请注明原文地址:https://kaotiyun.com/show/smLZ777K
本试题收录于:
系统分析师上午综合知识考试题库软考高级分类
0
系统分析师上午综合知识考试
软考高级
相关试题推荐
请将桌面上的“MicrosoftOfficeExcel2003”快捷方式附加到“开始”菜单的“固定项目列表”中,并查看设置后的“开始”菜单。
ISO/IEC27000ispartofagrowingfamilyofISO/IECinformationsecuritymanagementsystems(ISMS)standards.Itcomprisesinfo
Anumberoffactorsshouldbeconsideredwhenassigningvaluestoassets.Whichofthefollowingisnotusedtodeterminetheva
Whichofthefollowingcorrectlydescribesafederatedidentityanditsrolewithinidentitymanagementprocesses?
Emilyislisteningtonetworktrafficandcapturingpasswordsastheyaresenttotheauthenticationserver.Sheplanstouseth
TheInformationTechnologyInfrastructureLibrary(ITIL)consistsoffivesetsofinstructionalbooks.Whichofthefollowingis
Therearethreedifferenttypesofincidentresponseteams.Whichofthefollowingcorrectlydescribesavirtualteam?
Roberthasbeengiventheresponsibilityofinstallingdoorsthatprovidedifferenttypesofprotection.Hehasbeentoldtoins
WhichtwostatementsdescribetheoperationoftheCSMA/CDaccessmethod,whichisinuseontheEzonexamnetwork?(Choosetwo)
WhichofthefollowingservicesuseTCP?(Choosethree)A.DHCPB.SMTPC.SNMPD.FTPE.HTTPF.TFTP
随机试题
You______yesterdayifyouwerereallyseriousaboutthejob.
A.10%葡萄糖酸钙B.5%碳酸氢钠C.10%氯化钾D.11.2%乳酸钠E.0.1mmol/L盐酸溶液代谢性酸中毒,首选的碱性液是
建设工程施工劳务分包合同中,工程承包人的主要义务不包括()。
做出仲裁裁决后,当事人一方不履行时,对方可以( )。
某施工企业的一台铲车按工作量法计提折旧。该铲车原价30000元,预计净残值5%,可工作500个台班时数。投入使用后,第一年工作台班为250个小时,则该铲车第一年的折旧额为()。
物流服务项目的监控目标包括哪几个方面?
2012年12月7日,习近平总书记赴()考察工作。这次考察呈现了“轻车简从不扰民,实干兴邦不空谈”的形象,彰显了新一届中央领导示范执政新风。
了解什么使种群发生同步波动很重要,因为同步对灭绝风险、食物链稳定性和影响一个生态系统的其他因素都有明显效应。相似的捕食者——猎物循环中所涉及的相邻种群经常发生同步振荡,DavidVasseur和JeremyFox利用理论及实验室缩微环境发现,当捕食者存在时
经济制度和经济体制是内容与形式的关系。()
A、It’sanapple.B、It’sred.C、It’sverykindofyoutosayso.B听力原文:Whatcolorisit?意为:它是什么颜色的?应回答具体的颜色,其中只有B表示颜色。所以应选B。
最新回复
(
0
)