Most computer systems are(66)to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to

admin2009-02-15  18

问题 Most computer systems are(66)to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be(67)to an outsider attack by preventing(68)from outside can still be vulnerable to the insider attacks accomplished by abusive usage of(69)users. Detecting such abusive usage as well as attacks by outsides not only  provides  information on damage assessment, but also helps to prevent  future attacks. These attacks are usually(70)by tools referred to as Intrusion Detection Systems.

选项 A、searched
B、checked
C、tested
D、detected

答案D

解析
转载请注明原文地址:https://kaotiyun.com/show/fDxZ777K
0

相关试题推荐
最新回复(0)