(68) A.browser
B.repeater
C.router
D.server
(69) A.off
B.offer
C.office
D.officer
(70) A.abort
B.about
C.above
D.Around
●Most computer systems are (71) to two different groups of attacks:Insider attacks and outsider attacks. A system that is known to be (72) to an outsider attack by preventing (73) from outside can still be vulnerable to the insider attacks accomplished by abusive usage of (74) users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually (75) by tools referred to as Intrusion Detection Systems.
(71) A.vulnerable
B.week
C.sensitively
D.helpless
(72) A.reliable
B.secure
C.indestructible
D.steady
(73) A.visit
B.access
C.I/O
D.read/write
(74) A.power
B.rights
C.authorized
D.common
(75) A.searched
B.checked
C.tested
D.detected
希望與其他軟考考生進(jìn)行交流?點擊進(jìn)入軟考論壇>>>
更多信息請訪問:考試吧軟件水平考試欄目
北京 | 天津 | 上海 | 江蘇 | 山東 |
安徽 | 浙江 | 江西 | 福建 | 深圳 |
廣東 | 河北 | 湖南 | 廣西 | 河南 |
海南 | 湖北 | 四川 | 重慶 | 云南 |
貴州 | 西藏 | 新疆 | 陜西 | 山西 |
寧夏 | 甘肅 | 青海 | 遼寧 | 吉林 |
黑龍江 | 內(nèi)蒙古 |