首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Most computer systems are(165)to two different groups of attacks: Insider attacks and outsider attacks. A system that is known t
Most computer systems are(165)to two different groups of attacks: Insider attacks and outsider attacks. A system that is known t
admin
2009-05-15
34
问题
Most computer systems are(165)to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be(166)to an outsider attack by preventing(167)from outside can still be vulnerable to the insider attacks accomplished by abusive usage of(168)users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually(169)by tools referred to as Intrusion Detection Systems.
选项
A、searched
B、checked
C、tested
D、detected
答案
D
解析
大部分计算机系统都容易受到两种不同类型的攻击:来自内部的攻击和来自外部的攻击。系统可以通过禁止外部的访问保证免受外部攻击,但是仍然容易受到因用户权限滥用而引起的内部攻击。检测这样的权限滥用和来自外部的攻击,不仅提供了能评估损害的信息,而且也有助于防止以后再受到攻击。这些攻击通常用被称为入侵检测系统的工具检测出来。
转载请注明原文地址:https://kaotiyun.com/show/sdUZ777K
本试题收录于:
数据库系统工程师上午基础知识考试题库软考中级分类
0
数据库系统工程师上午基础知识考试
软考中级
相关试题推荐
Aprojectmanagementtechniquethatiscurrentlyinwidespreaduseisthe(71).Thepurposeofthistechniqueistodetail,inh
如果某IT项目客户的业务部署在其Internet网站上,客户的供应商、经销商等合作伙伴的业务也部署在各自的Interlnet网站上。客户要求自己的IT系统能通过Internet,和其合作伙伴集成起来,开发者首先要考虑的技术是______。A.COM和Ca
________istheprocessofdocumenting,analyzing,tracing,prioritizingandagreeingonrequirementsandthencontrollingchangean
Virtualreality(orVR(1)iskindofabuzzwordthesedaysincomputergraphics.VRisartificialrealitycreatedbyacomputertha
DOM is a platform and language-(66)AP1 that allows programs and scripts to dynamically access and update the content, structure
There is no question that computer applications such as(71), electronic mail, and(72)publishing have changed the way people work
One of the functions of the(71)is to store the applications programs { or the various secondaries. The(72)may have similar or d
The UNIX operating system is made up of three parts; the kernel, the shell and the programs. The kernel of UNIX is the(71)of the
The Simple Network Management Protocol(SNMP)is an(66)protocol that facilitates the exchange of management information between(67
Many word processing programs include spell checker. It checks the spelling of every word in a(120)by looking up each word in it
随机试题
《春风沉醉的晚上》是我国现代作家________的散文名作。
H+—K+—ATP酶泵抑制剂是()
无二尖瓣狭窄时PAWP不能反映的是
患者,女,18岁,经期持续10天,量较多,诊断为功能失调性子宫出血,给予口服大剂量己烯雌酚治疗。患者询问用药的目的,正确的解释是
患者,男,42岁。既往有精神分裂症病史,现处于恢复期。各项检查无异常。拟行视网膜玻璃体切割术,最佳麻醉方法为
国务院建设行政主管部门负责()。
保险合同是()约定保险权利义务关系的协议。
商业银行派生存款的能力()。
【程序说明】程序功能是若输入的N值为5,则输出结果如下:1111211331146
有一种与设备无关的图像格式,在所有Windows环境下运行的所有图像处理软件都支持的图像文件格式是【 】。
最新回复
(
0
)