●Most computer systems are (71) to two different groups of attacks:Insider attacks and out

10 查阅

●Most computer systems are (71) to two different groups of attacks:Insider attacks and outsider attacks. A system that is known to be (72) to an outsider attack by preventing (73) from outside can still be vulnerable to the insider attacks accomplished by abusive usage of (74) users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually (75) by tools referred to as Intrusion Detection Systems.

(71) A.vulnerable

B.week

C.sensitively

D.helpless

(72) A.reliable

B.secure

C.indestructible

D.steady

(73) A.visit

B.access

C.I/O

D.read/write

(74) A.power

B.rights

C.authorized

D.common

(75) A.searched

B.checked

C.tested

D.detected

参考答案:

A,B,B,C,D【解析】(参考译文)大多数计算机系统主要受到两类不同类型的攻击:内部攻击和外部攻击。系统虽然可以通过阻止外部访问防止受到外部攻击,但是,仍然容易受到伴随着内部合法用户的特权滥用而产生的内部攻击。通过检测那些授权滥用的内部攻击和外部攻击,不但可以提供信息损坏的评估,而且还能免于受到以后的攻击。这些攻击通常通过来自攻击监测系统的工具来发现。

软考中级