Most computer systems are(165)to two different groups of attacks: Insider attacks and outsider attacks. A system that is known t

admin2009-05-15  18

问题 Most computer systems are(165)to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be(166)to an outsider attack by preventing(167)from outside can still be vulnerable to the insider attacks accomplished by abusive usage of(168)users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually(169)by tools referred to as Intrusion Detection Systems.

选项 A、searched
B、checked
C、tested
D、detected

答案D

解析 大部分计算机系统都容易受到两种不同类型的攻击:来自内部的攻击和来自外部的攻击。系统可以通过禁止外部的访问保证免受外部攻击,但是仍然容易受到因用户权限滥用而引起的内部攻击。检测这样的权限滥用和来自外部的攻击,不仅提供了能评估损害的信息,而且也有助于防止以后再受到攻击。这些攻击通常用被称为入侵检测系统的工具检测出来。
转载请注明原文地址:https://kaotiyun.com/show/sdUZ777K
0

相关试题推荐
最新回复(0)