首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
The first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, all now highly recognisable names behind many o
The first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, all now highly recognisable names behind many o
admin
2013-05-10
29
问题
The first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, all now highly recognisable names behind many of the computer technologies used today. These early hackers had a love of technology and a compelling need to know how it all worked, and their goal was to push programs beyond what they were designed to do. Back then, the word "hacker" didn’t have the negative connotation it has today. The original hacker ethic, rooted out of simple curiosity and a need to be challenged, appears to be dead.
The objectives of early hackers are a far cry from the goals of today’s hackers. The motivation of the new breed of hackers appears not to be curiosity, or a hunger for knowledge, as it used to be. Instead, most of today’s hackers are driven by greed, power, revenge, or some other malicious intent, treating hacking as a game or sport, employing the tools that are readily available via the Internet.
The rate of security attacks is actually outpacing the growth of the Internet. This means that something besides the growth of the Internet is driving the rise in security attacks. Here are some realities you should know about; Operating systems and applications will never be secure. New vulnerabilities will be introduced into your environment every day. And even if you ever do get one operating system secure, there will be new operating systems with new vulnerabilities—phones, wireless devices, and network appliances. Employees will never keep up with security polices and awareness. It doesn’t matter how much you train and educate your employees. If your employees disregard warnings about the hazards of opening questionable email attachments, how are you going to educate them about properly configuring firewalls and intrusion detection systems for their PCs? Managers have more responsibility than ever. And on top of the realities listed above, security managers are being asked to support increasing degrees of network availability and access.
There are some good security measures you can take: Employ a layer 7, full-inspection firewall. Automatically update your anti-virus at the gateway, server and client. Keep all of your systems and applications updated. Hackers commonly break into a Web site through known security holes, so make sure your servers and applications are patched and up to date. Turn off unnecessary network services. Eliminate all unneeded programs. Scan network for common backdoor services—Use intrusion detection systems, vulnerability scans, anti-virus protection.
The underlined word "hacker" (Para. 1) most probably means "______".
选项
A、highly recognisable names behind many of the computer technologies used today
B、the negative connotation of those computer users
C、a game, employing the tools that are readily available via the Internet
D、People who break into computer systems
答案
D
解析
黑客指的是计算机和网络科技的专家,可以进入计算机系统,所以D是正确答案。
转载请注明原文地址:https://kaotiyun.com/show/vqxd777K
本试题收录于:
公共英语四级笔试题库公共英语(PETS)分类
0
公共英语四级笔试
公共英语(PETS)
相关试题推荐
【61】Themethodofscientificinvestigationisnothingbuttheexpressionofthenecessarymodeofworkingofthehumanmind;it
Ramoswasbrilliant,handsome,wealthy,andoneofRiodeJaneiro’s(里约热内卢的)beautifulpeople.Atagethirty-six,hewasaprom
Intheearly1950s,historianswhostudiedpre-industrialEurope(whichwemaydefinehereasEuropeintheperiodfromroughly1
Everyoneispursuingthegreathappiness,buthaveweeveraskedourselveswhattherealhappinessis?Therearemanymythsabou
Duringthe1980s,unemploymentandunderemploymentinsomecountrieswasashighas90percent.Somecountriesdidnot【21】_____
Duringthe1980s,unemploymentandunderemploymentinsomecountrieswasashighas90percent.Somecountriesdidnot【21】_____
Exactlywherewewillstandinthelongwaragainstdiseasebytheyear2050isimpossibletosay.【61】Butifdevelopmentsinr
Theenergycrisis,whichisbeingfeltaroundtheworld,hasdramatizedhowthecarelessuseoftheearth’sresourceshasbrough
Political答案在独白第四句:Hestudiedpoliticalscience...(他在哈佛大学学习政治学)。
随机试题
公职律师,是指任职于党政机关或者人民团体,依法取得司法行政机关颁发的公职律师证书,在本单位从事法律事务工作的公职人员。下列哪一或哪些选项属于公职律师可以受所在单位委托或者指派从事的法律事务?()
A、小指B、环指C、中指D、示指E、拇指握持牙挺时,固定在挺杆上的手指是
A.热证B.表证C.实证D.虚证E.寒证怔忡,临床上多见于()
1991年2月9日,原告李某酒后来到县城浴室洗澡。洗完后,李某躺在二号池的搁板上睡觉,被浴室工作人员发现并制止。李某在爬起时,脚下一滑,从搁板上掉落二号池内,当即被人拉出。因二号池水在80℃以上,李某自腰部以下大部被烫伤,烫伤面积占全身的30%。李某受伤后
下列义务中,不属于附随义务的是:()
房地产市场属于()市场。
关于钢化玻璃的特性,下列说法中正确的有()。
课程目标的依据主要有三个方面【】
(2017年清华大学)以下关于股票股利的说法,不正确的是()。
设备上无法创建正确的MAC转发表项,造成二层数据转发失败,故障的原因包括()。①MAC、接口、VLAN绑定错误②配置了MAC地址学习去使能③存在环路MAC地址学习错误④MAC表项限制或超规格
最新回复
(
0
)