首页
登录
职称英语
共用题干 第二篇HackThe first big-name hackers
共用题干 第二篇HackThe first big-name hackers
考试题库
2022-08-02
14
问题
共用题干第二篇
Hack
The first big-name hackers include Steve Wozniak,Bill Gates and Linus Torvalds,all now highly recog-
nizable names behind many of the computer technologies used today. These early hackers had a love of tech-
nology and a compelling need to know how it all worked,and their goal was to push programs beyond what
they were designed to do.Back then,the word"hacker" didn't have the negative connotation it has today.
The original hacker ethic,rooted out of simple curiosity and a need to be challenged,appears to be dead.
The objectives of early hackers are a far cry from the goals of today'S hacker. The motivation of the new
breed of hackers appears not to be curiosity,or a hunger for knowledge,as it used to be.Instead,most of to-
day'S hackers are driven by greed,power,revenge,or some other malicious intent,treating hacking as a game
or sport,employing the tools that are retdily available via the Internet.
The rate of security attacks is actually outpacing the growth of the Internet.This means that something
besides the growth of the Internet is driving the rise in security attacks.Here are some realities you should
know about:Operating systems and applications will never be secure.New vulnerabilities will be introduced
into your environment every day.And even if you ever do get one operating system secure,there will be new
operating systems with new vulnerabilities一phones,wireless devices,and network appliances.Employees will
never keep up with security polices and awareness.It doesn't matter how much you train and educate your
employees.If your employees disregard warnings about the hazards of opening questionable e-mail attach-
ments,how are you going to educate them about properly configuring firewalls and intrusion detection systems
for their PCs?Managers have more responsibility than ever. And on top of the realities listed above,security
managers are being asked to support increasing degrees of network availability and access.There are some
good security measures you can take:Employ a layer 7,full-inspection firewall.Automatically update your
anti-virus at the gateway,server and client. Keep all of your systems and applications updated.Hackers com-
monly break into a website through known security holes,so make sure your servers and applications are
patched and up to date.Turn off unnecessary network services.Eliminate all unneeded programs.Scan net-
work for common backdoor services一use intrusion detection systems,vulnerability scans,anti-virus protection.The underlined word"hacker"(Para.1)most probably means“ ___________”.A:highly recognizable names behind many of the computer technologies used todayB:the negative connotation of those computer usersC:a game,employing the tools that are readily available via the InternetD:people who break into computer systems
选项
The underlined word"hacker"(Para.1)most probably means“ ___________”.
A:highly recognizable names behind many of the computer technologies used today
B:the negative connotation of those computer users
C:a game,employing the tools that are readily available via the Internet
D:people who break into computer systems
答案
D
解析
本题的相关信息在文章的第一段。Steve Wozniak , Bill Gates and Linus Torvalds都是一 些早期的著名黑客,不同于现今的黑客,他们出于好奇,勇于挑战计算机和网络科技的漏洞,并 以此推动计算机和网络科技的进步。
黑客指的是计算机和网络科技方面的专家,可以进人计算机系统,所以D是正确答案。
依据是第三段中“Employees will never keep up with security polices and awareness.It doesn't matter how much you train and educate your employees”。
文中与之相关的内容是第三段的“If your employees disregard warnings about the hazards of opening questionable e一mail attachments,how are you going to educate them about properly con- figuring firewalls and intrusion detection systems for their PCs?"。这与B项的意思不一致。
其依据是第三段倒数第三句“Turn off unnecessary network services.”即关闭不必要的网 络服务,而不是关闭所有的网络服务。一字之差,却相去甚远,要注意辨析。
转载请注明原文地址:https://tihaiku.com/zcyy/1491489.html
本试题收录于:
理工A题库理工类分类
理工A
理工类
相关试题推荐
【题干】_____A.anextralargesaunaandstea
共用题干 TheBeginningofAmericanLi
共用题干 TheBeginningofAmericanLi
共用题干 TheBeginningofAmericanLi
共用题干 TheBeginningofAmericanLi
共用题干 TheBeginningofAmericanLi
共用题干 TheBeginningofAmericanLi
共用题干 GorillasHaveaWordforitKokois
共用题干 GorillasHaveaWordforitKokois
共用题干 GorillasHaveaWordforitKokois
随机试题
ItwasthefirsttimeRebecca(invite)______ustodineout.hadinvited根据句意,应该使用过
ResearchersattheUniversityofCalifornia-Berkeleyarechallengingourlon
TheValueofWritingWell[A]It’sthattimeofyearagain.No,not"the
()表示原有的趋势暂时处于休整阶段,之后还要随着原趋势的方向继续行动。A、上升三角形B、下降三角形C、对称三角形D、不对称三角形C对称三角形情
某甲施工单位通过施工投标方式与建设单位签订了某公路施工项目的施工合同。甲施工单位
食物中叶酸的烹调损失率为( )。A.10%~20% B.30%~50% C
某地区2019年玉米产量1000万吨,向外发送量750万吨,由其他地区运进该地区
下列属于市场失灵表现的有: A.道德风险 B.自由竞争 C.逆向选择 D
第二支柱明确要求商业银行应当建立完善的风险管理框架和稳健的内部资本充足评估程序,
教学策略的基本特征包括综合性、灵活性和()。 A.可操作性B.时代性 C
最新回复
(
0
)