首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
To compete in today’s fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitor
To compete in today’s fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitor
admin
2009-05-15
50
问题
To compete in today’s fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their internal enterprise networks. These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become(171). Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources to(172)activity. For many organizations, however, the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty-two percent of surveyed CISOs state that they currently use a moat and castle’s security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch(173)of service attacks or steal(174)information by snooping the network. As they access the corporate network, mobile and remote users inadvertently can infect the network with(175) and worms acquired from unprotected public networks. Hackers masquerading as internal users can take advantage of weak internal security to gain access to confidential information.
选项
A、sickness
B、disease
C、viruses
D、germs
答案
C
解析
为了适应当今的快速竞争环境,组织正逐步允许承包商、合作伙伴、访问者和顾客访问它们的企业内部网络,这些用户可以在会议室或办公室通过有线端口连接网络,或者通过无线访问点。在这种允许第三方进行的开放式访问中,局域网变得难以防守。第三方可能以各种方式带来风险,从用一台受感染的膝上型电脑到连接未授权访问的网络资源进行恶意活动。然而,对很多组织而言,考虑到操作的复杂性和保证系统安全的成本,第三方网络访问是禁止的。接受调查的注册信息安全管理人员中,有52%的人表示他们目前使用防火墙,而且承认在内部的防御措施是脆弱的。来自内部用户的威胁也正在逐步成为安全考虑的一个因素。怀有恶意的员工可能发起拒绝服务攻击或者通过窥探网络窃取机密信息。当移动的和远程的用户访问网络时,他们一不小心就会使网络感染来自未受保护的公众网络的病毒和蠕虫。黑客伪装成内部用户,会利用脆弱的内部安全获得访问机密信息的权限。
转载请注明原文地址:https://kaotiyun.com/show/O1LZ777K
本试题收录于:
系统分析师上午综合知识考试题库软考高级分类
0
系统分析师上午综合知识考试
软考高级
相关试题推荐
Thefollowingscenariowillbeusedforquestions26,27,and28.Trentisthenewmanagerofhiscompany’sinternalsoftwarede
Phishingandpharmingaresimilar.Whichofthefollowingcorrectlydescribesthedifferencebetweenphishingandpharming?
______providesforavailabilityandscalability.Itgroupsphysicallydifferentsystemsandcombinesthemlogically,whichhelps
Thefollowingscenariowillbeusedtoanswerquestions30,31and32.Jeffisleadingthebusinesscontinuitygroupinhiscom
Whichofthefollowingbestdescribeswhye-mailspoofingiseasilyexecuted?
Thefollowingscenariowillbeusedforquestions28and29.Jackhasbeentoldthatsuccessfulattackshavebeentakingplacea
WidgetsInc.wishestoprotectitslogofromunauthorizeduse.Whichofthefollowingwillprotectthelogoandensurethatothe
YouaretheadministratorofSQLserver2000computer.TheservercontainsadatabasenamedMedicalRecords.Usersaccessmedical
Youarethesystemadministratorforanelectronicsmanufacturingcompany.TheaccountingdepartmentusesWindows98computers.
Themaincontentof(71)________istounderstandthebusinesssector’spresentandfuture,understandthebusinesssector’spoli
随机试题
2014年年末,某省公路里程172167千米,同比增长2.8%,其中,高速公路4237千米,同比增长3.3%。国家铁路正线延展里程和营业里程分别为15060千米和9351千米,分别同比增长-0.28%和0.23%。地方铁路正线延展里程和营业里程分别为180
不具备路由和跨网段操作功能的协议是()
额窦可显示于下列哪些体位片
过期流产的刮宫时机应在
下列行为违反了《建设工程勘察设计管理条例》的是()。
西南矿业公司产出的矿产原材料金属含量比较高,是富矿,在市场上的售价比其他矿高。目前冶炼产品的市场竞争激烈,从经济效益的角度来看,对自己的矿进行进一步冶炼再出售不合算,所以西部矿业决定停止加工冶炼业务,直接出售自己的矿,以获取更大的利润。这反映的风险管理工具
()是指采用一种预先设计的结构性表格,由考评者以文字的形式对员工的行为做出描述的考评方法。
教学与研究发现,学生解决抽象而不带具体情节的问题时比较困难,而解决具体而接近实际的问题时比较容易。()
根据下列材料回答问题。“十一五”期问,我国货物进出口总额累计116806亿美元。其中,出口总额63997亿美元.比“十五”期间增长1.7倍;进口总额52809亿美元,比“十五”期间增长1.4倍。“十一五”前两年,我国货物进出口总额保持23%以上的快速增
下列说法错误的是()。
最新回复
(
0
)