[单选题]

Most computer systems are (71) to two different groups of attacks:Insider attacks and outsider attacks. A system that is known to be (72) to an outsider attack by preventing (73) from outside can still be vulnerable to the insider attacks accomplished by abusive usage of (74) users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually (75) by tools referred to as Intrusion Detection Systems.(71)

A.vulnerable

B.week

C.sensitively

D.helpless(72)

A.reliable

B.secure

C.indestructible

D.steady(73)

A.visit

B.access

C.I/O

D.read/write(74)

A.power

B.rights

C.authorized

D.common(75)

A.searched

B.checked

C.tested

D.detected

参考答案与解析:

相关试题

Most computer systems are (71) to two di

[单选题]Most computer systems are (71) to two different groups of attacks:insider attacks and outsider attacks.A system that is known to be (72) to an outsider attack by preventing(73) from outside can still be vulnerable to the insider attacks accomplished

  • 查看答案
  • Most computer systems are(71)to two diff

    [单选题]Most computer systems are(71)to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be(72)to an outsider attack by preventing(73)from outside can still be vulnerable to the insider attacks accomplished by

  • 查看答案
  • Computer systems consist of two very dif

    [单选题]C.omputer systems consist of two very different types of elements:(71 ) , which includes all the physical things that can be touched and Software, which tells the hardware how to do.A.Operating systemB.I/O devicesC.CoursewareD.Hardware

  • 查看答案
  • Computer systems consist of two very dif

    [单选题]C.omputer systems consist of two very different types of elements: Hardware, which includes all the physical things that can be touched and(71)which tells the hardware how to do.A.Operating systemB.I/O devicesC.CoursewareD.Software

  • 查看答案
  • Most Computer operating systems in use t

    [单选题]Most Computer operating systems in use today, including all consumer-targeted systems, include a TCP/IP().A . planB . requirementC . implementationD . design

  • 查看答案
  • MIMD systems can be classified into(71)

    [单选题]MIMD systems can be classified into(71)oriented systems,highavailability systems and responseoriented systems.The goal of(71).orlented multiprocessing is to obtain high(71)(72)minimal computing cost.The techniques employed by multiprocessor operat

  • 查看答案
  • The financial systems that are operationally efficient are most likely characterized by:

    [单选题]The financial systems that are operationally efficient are most likely char

  • 查看答案
  • The financial systems that are operationally efficient are most likely characterized by:

    [单选题]The financial systems that are operationally efficient are most likely char

  • 查看答案
  • Which is not a computer language? (71)

    [单选题]Which is not a computer language? (71)(71) A. officeB. JavaC. C++D. C#

  • 查看答案
  • Users also need (71) systems to help th

    [单选题]Users also need (71) systems to help them explore the web and discover interesting data sources and interfaces that support different query and search paradigms.(71) A.negativeB.adaptiveC.passiveD.adaption

  • 查看答案
  • Most computer systems are (71) to two d