试题查看

首页 > 软件水平考试 > 试题查看
【单选题】

Most computer systems are (71) to two different groups of attacks:insider attacks and outsider attacks.A、system that is known to be (72) to an outsider attack by preventing (73) from outside can still be vulnerable to the insider attacks accomplished by abusive usage of (74) users.Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment,but also helps to prevent future attacks.These attacks are usually (75) by tools referred to as IntrusionDetection Systems.

A.reliable
B.secure
C.indestructible
D.steady
查看答案解析

参考答案:

正在加载...

答案解析

正在加载...

根据网考网移动考试中心的统计,该试题:

23%的考友选择了A选项

72%的考友选择了B选项

4%的考友选择了C选项

1%的考友选择了D选项

你可能感兴趣的试题

计算N!的递归算法如下,求解该算法的时间复杂度时,只考虑相乘操作,则算法的计算时在Linux操作系统中提供了大量的网络配置命令工具,其中不带参数的route命令FDDI标准规定网络的传输媒体采用(65)。A.非屏蔽双绞线B.屏蔽双绞线C.光根据乔姆斯基20世纪50年代建立的形式语言的理论体系,语言的文法被分为四种类型,Mostcomputersystemsare(71)totwodifferent根据乔姆斯基20世纪50年代建立的形式语言的理论体系,语言的文法被分为四种类型,