KEYWORDS
breach 破壞,缺口,違背
attack 攻擊
vulnerability 脆弱性
interception 截獲,竊聽
penetration 滲入,穿透
threat 威脅
exposure 暴露
fabrication 偽造,建造
EXERCISES
Multiple choices.
(1)A computer system is a collection of___.
a.hardware b.software
c.persons d.data
(2)An intruder may use___to penetrate a computer system.
a.the most obvious means b.the less obvious means
c.a(chǎn)ny available means d.one fixed way
(3)A sophisticated perimeter physical security system___.
a.can compensate for unguarded access by telephone line
b.can not compensate for unguarded access by telephone line
c.can compensate for unguarded access by a modem
d.can not compensate for unguarded access by a modem
(4)The weakest point is___.
a.the easiest penetration b.the most serious vulnerability
c.expected by any intruder d.difficult to break
(5)The major assets of computing systems are___.
a.hardware b.software
c.data d.a(chǎn)ll of them
(6)Interruption can cause asset of system___.
a.useful b.unusable
c.unavailable d.lost
(7)Unauthorized party can be___.
a.a(chǎn) computer system b.a(chǎn) person
c.legal user d.a(chǎn) program
(8)Examples of modification include___.
a.modification of the values in a data base
b.a(chǎn)ltering a program
c.modifying data being transmitted
d.making the operating system unavailable
(9)Fabrication intrusion includes___.
a.to add spurious transaction b.to interrupt a system
c.to fabricate objects d.to add records
(10)There are___kinds of threats to the security of a computer system.
a.three b.four
c.five d.six
更多軟考資料請(qǐng)?jiān)L問:考試吧軟件水平考試欄目
希望與更多網(wǎng)友交流,請(qǐng)進(jìn)入考試吧軟件水平考試論壇
北京 | 天津 | 上海 | 江蘇 | 山東 |
安徽 | 浙江 | 江西 | 福建 | 深圳 |
廣東 | 河北 | 湖南 | 廣西 | 河南 |
海南 | 湖北 | 四川 | 重慶 | 云南 |
貴州 | 西藏 | 新疆 | 陜西 | 山西 |
寧夏 | 甘肅 | 青海 | 遼寧 | 吉林 |
黑龍江 | 內(nèi)蒙古 |