试题详情
- 单项选择题 To compete in today's fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their internal enterprise networks.These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become(6) .Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources to(7)activity. For many organizations, however,the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty-two percent of surveyed CISOs state that they currently use a moat and castle's security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch (8) of service attacks or steal (9) information by snooping the network. As they access the corporate network, mobile and remote users inadvertently can infect the network with (10) and worms acquired from unprotected public networks. Hackers masquer-ading as internal users can take advantage of weak internal security to gain access to confidential information. 空白处(7)应选择()
A、venomous
B、malicious
C、felonious
D、villainous
关注下方微信公众号,在线模考后查看

热门试题
- 在WindowsXP中配置IPv6的命令
- ()是计算机网络最基本的功能之一。
- 在数据通信系统中,采用频带传输时,在传输
- 入侵检测系统通常处于()之后,对网络活动
- 建筑群子系统布线时,AT&T PDS推荐
- ()是性能管理的功能。
- 计算机主机是()、()和()的总称,主要
- 传输层使高层用户看到的就是好像在两个运输
- IP地址是202.114.18.190,
- 在以太网中,载波监听是网络协议设计中很重
- 典型网络管理体系结构有哪些?各自特点是什
- 防火墙应该安装在()之间。
- 资源系统实现大区域和局站的关联,是在()
- 以下情况可以使用访问控制列表准切描述的是
- 阐述对不支持TCP/IP的设备如何进行S
- 网络中管理计算机通信的规则称为()。
- 与X.25比较,FR有哪些优点?主要采用
- 在“全局配置”模式下删除VLAN10的命
- 路由器涉及OSI参考模型的()层。
- 要在一个接上配置IP地址和子网掩码,正确