首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Most computer systems are(165)to two different groups of attacks: Insider attacks and outsider attacks. A system that is known t
Most computer systems are(165)to two different groups of attacks: Insider attacks and outsider attacks. A system that is known t
admin
2009-05-15
50
问题
Most computer systems are(165)to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be(166)to an outsider attack by preventing(167)from outside can still be vulnerable to the insider attacks accomplished by abusive usage of(168)users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually(169)by tools referred to as Intrusion Detection Systems.
选项
A、searched
B、checked
C、tested
D、detected
答案
D
解析
大部分计算机系统都容易受到两种不同类型的攻击:来自内部的攻击和来自外部的攻击。系统可以通过禁止外部的访问保证免受外部攻击,但是仍然容易受到因用户权限滥用而引起的内部攻击。检测这样的权限滥用和来自外部的攻击,不仅提供了能评估损害的信息,而且也有助于防止以后再受到攻击。这些攻击通常用被称为入侵检测系统的工具检测出来。
转载请注明原文地址:https://kaotiyun.com/show/sdUZ777K
本试题收录于:
数据库系统工程师上午基础知识考试题库软考中级分类
0
数据库系统工程师上午基础知识考试
软考中级
相关试题推荐
Projectschedulemanagementismadeupofsixmanagementprocessesincluding:activitydefinition,activitysequencing,(16)andsch
The(64)ProcessGroupconsistsoftheprocessesusedtocompletetheworkdefinedintheprojectmanagementplantoaccomplishth
Thefollowingdiagramis()networktopologystructure.
Virtualreality(orVR(1)iskindofabuzzwordthesedaysincomputergraphics.VRisartificialrealitycreatedbyacomputertha
WebSQLisaSQL-like(71)languageforextractinginformationfromtheWeb.ItscapabilitiesforperformingnavigationofWeb(72)ma
COBHIT(ControlObjectivesforInformationandrelatedTechnology)是目前国际上通用的信息系统审计的标准,由信息系统审计与控制协会在。1996年公布。是一个在国际上公认的、权威的安全与信息技术
One of the functions of the(71)is to store the applications programs { or the various secondaries. The(72)may have similar or d
C is sometimes referred to as a ’high -level(66)language’. Some people think that’s an insult, but it’s actually a deliberate an
C is sometimes referred to as a ’high -level(66)language’. Some people think that’s an insult, but it’s actually a deliberate an
For users, microkernel technology promises(90), compact and sophisticated operating systems that are typically(91)across a range
随机试题
女性肺结核患者,大咯血一小时,X线胸片示右肺上叶空洞性肺结核。BP12/8kPa(90/60mmHg),P100次/分钟,采取下列哪种治疗措施最恰当
设备及安装工程概算的编制方法主要有()和综合吨位指标法。
下列关于资产的企业所得税税务处理的说法,正确的有()。(2016年)
试述学生知、情、意、行统一发展的规律。
8,12,(),34,50,68
某班共有学生40人,其中喜欢打乒乓、篮球、排球的学生分别有35、33、32人,问这三项运动都喜欢的学生至少有多少人?
社会主义法律的规范作用根据其指向和侧重可以分为指引作用、预测作用、评价作用、强制作用和教育作用。除教育作用外,法律的其他作用中具有教育意义的是
设f(x)连续且F(x)=x2/(x-a)∫axf(t)dt,则为().
如果对数据的实时性要求比较高,但对数据的准确性要求相对较低(如在线电影),一般可在传输层采用______协议。
IcametoIndiaayearagotofindavillageinwhichIcouldliveandwrite,butitwasmanymonthsbeforeIsettleddown.
最新回复
(
0
)