首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
A、By developing advanced technology. B、By providing financial support. C、By installing government-certified software. D、By prote
A、By developing advanced technology. B、By providing financial support. C、By installing government-certified software. D、By prote
admin
2014-06-30
63
问题
The United States has announced a plan to fight the quickly growing threat from cyber spies and Internet attackers known as hackers. America’s Attorney General Eric Holder recently said that ever-improving technology is making it easier for people and countries to strike at the United States. Mister Holder said the Justice Department is fighting back aggressively. He said it is working with various states and government agencies to find and bring to justice those involved in cyber theft and cyber spies.(20)And, the attorney general called for increased co-operation with private companies. He described the importance of keeping trade secrets a secret. As attorney General Eric Holder says, a single trade secret can be worth millions—or even billions—of dollars.(21)Trade secret theft can require companies to lay off employees, close factories, to lose sales and profits, to experience a decline in competitive position and advantage, or even to go out of business. The new policy also calls for fines and trade actions against individuals and countries that target American trade secrets.
The plan was announced the day after the American information security company Mandiant published the findings of its investigation of cyber-attacks. It reports that more than 140 companies have been attacked since 2006.(22)The targets include some of the biggest companies in the United States, companies like Apple Computer, Facebook, Lockheed Martin, CocaCola and many others. In addition to companies and banks, the hackers are also reported to strike state, federal and international agencies and organizations. Among the areas targeted are satellites, information technology, telecommunications, aerospace, public administration and scientific research.
20. How can private companies help fight against cyber threats, according to the attorney general?
21. What disastrous consequence could trade secret theft cause to companies?
22. What can be learned from the findings of Mandiant?
选项
A、By developing advanced technology.
B、By providing financial support.
C、By installing government-certified software.
D、By protecting their trade secrets well.
答案
D
解析
短文中提到,美国检察长呼吁私人公司大力合作,与网络犯罪相对抗,他特别提到了商业秘密需要很好的保护这一条,故答案为D)。
转载请注明原文地址:https://kaotiyun.com/show/ZK17777K
0
大学英语六级
相关试题推荐
Tenyearsago,JoeAllenbeganstudyingadiversegroupofseventhgradersneartheUniversityofVirginia,wherehe’saprofess
TheSupremeCourtwillhearargumentstodayabouttheuseofpublicmoneyfortheprivateschoolingofchildrenwithspecialnee
WhenZadieSmithfinishedhermostrecentnovel,OnBeauty,shedrankabottleofwine,laydownamongtherottingapplesinher
Playistheprinciplebusinessofchildhood,andmoreandmoreinrecentyears’researchhasshownthegreatimportanceofplay
A、Stayinginbed.B、Stayingoffthetelephone.C、Switchingoffthelights.D、Takingashower.B短文提到,如果闪电时你在家里,请远离电话。选B。
这周颁布的一项新法律要求子女必须经常探望年龄超过60岁的父母,并确保他们经济和精神上的需求得到满足。星期二,新华社报导了一条新闻,来自江苏省无锡市的一位77岁的老太太起诉她的女儿忽略她。这是新法律生效后的第一起案件,当地法院判定她的女儿必须每月探望母亲至少
A、Givesupporttopartymembers.B、Chooseapersontorunforvicepresident.C、Runagainstmembersoftheirownparties.D、Take
A、Thewomanneedstolearnmoreaboutjazzmusic.B、Thewomanhasgoodappreciationabilityofmusic.C、Jazzmusictouchesavera
随机试题
PowerPoint支持的文件类型及扩展名有哪些?
与元初行省性质基本相同,可以说已开元朝行省制度先河的制度是()
财产所有权的合法取得方式可分为_______和_______两种。
在计算机中采用二进制,是因为( )。
质量管理体系要求所有从事影响产品质量工作的人员应有能力胜任所在岗位的工作,这种能力是基于适当的_________。
阅读以下文章,回答问题:地震发生时,最基本的现象是地面的连续振动,主要是明显的晃动。极震区的人在感到大的晃动之前,有时首先感到上下跳动。这是因为地震波从地内向地面传来,纵波首先到达的缘故。横波接着产生大振幅的水平方向的晃动,是造成地震灾害的主要原因。
A、B、C三辆卡车一起运输1次,正好能运完一集装箱的某种货物。现三辆卡车一起执行该种货物共40集装箱的运输任务,A运7次、B运5次、C运4次,正好运完5集装箱的量。此时C车休息,而A、B车各运了21次,又完成了12集装箱的量。问如果此后换为A、C两车同时运
下列关于二十四节气的说法中,错误的是()。
DearProfessorMikeWhitney,WeareverygladtohearthatyouareattendinganinternationalconferenceinBeijing.Wea
A、Shebrokethemicrophone.B、Shewasinterruptedbyaphonecallduringherpresentation.C、Sheisplanningtogiveherpresent
最新回复
(
0
)