问答题Questions 1 to 5 are based on the following passage.  Computer users fed up with hacker attacks and other security threats that exploit holes in Microsoft software are increasingly turning to alternatives such as open source Internet browsers developed

题目
问答题
Questions 1 to 5 are based on the following passage.  Computer users fed up with hacker attacks and other security threats that exploit holes in Microsoft software are increasingly turning to alternatives such as open source Internet browsers developed by Mozilla.  “It’s reflective of a trend that we’ve seen over the last year with more web users becoming frustrated with the Internet experience,” said Chris Hoffmann of the Mozilla Foundation, a non-profit group supported by Sun Microsystems, IBM and other companies, backing as an alternative to Microsoft.  Much of that frustration has centered on Microsoft, which has been heavily criticized for producing software vulnerable to hand virus writers. Microsoft has responded with a series of patches designed to plug vulnerabilities in its Windows operating system, Internet Explorer web browser and other software.  But computer owners are growing weary of continuously updating software to protect against new threats. One incident last month enabled hackers to gain access to web surfers’ computers by taking advantage of vulnerabilities in Microsoft’s browser.  Hackers could then install remote access Trojan programs that enabled them to control a victim’s computer. The hackers could also install software to capture a victim’s keystrokes to steal data such as bank account numbers and passwords.  Mr. Hoffmann hoped publicity stemming from Microsoft’s security woes(灾难) would translate into a market share increase for Mozilla’s software, which includes the new highly regarded Firefox Internet browser.  But Mozilla suffered a setback last week when it was forced to issue a software patch to counter a newly discovered vulnerability affecting its Internet browsers.  Still, Mr. Hoffmann said Microsoft’s security woes stem in part from the way its browser has been integrated into Windows for user convenience. Security experts agree that has made it easier for hackers to exploit computers running on Microsoft software.  Others suggest Microsoft has been targeted by hackers and virus writers simply because more than 90 per cent of the world’s computers run on the software giant’s operating system.  Questions:  1.What is the meaning of the phrase “fed up with” (Para.1)?  2.It can be guessed that the word “plug” (Para.3) means ________________.  3.Why more web users have become frustrated?  4.What happened to Mozilla’s Internet browsers last week?  5.How would Microsoft be less vulnerable?

相似考题

3.Text 3 The first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, all now highly recognizable names behind many of the computer technologies used today. These early hackers had a love of technology and a compelling need to know how it all worked, and their goal was to push programs beyond what they were designed to do. Back then, the word "hacker" didn't have the negative connotation it has today. The original hacker ethic, rooted out of simple curiosity and a need to be challenged, appears to be dead.The objectives of early hackers are a far cry from the goals of today's hacker. The motivation of the new breed of hackers appears not to be curiosity, or a hunger for knowledge, as it used to be. Instead, most of today's hackers are driven by greed, power, revenge, or some other malicious intent, treating hacking as a game or sport, employing the tools that are readily available via the Internet.The rate of security attacks is actually outpacing the growth of the Internet. This means that something besides the growth of the Internet is driving the rise in security attacks. Here are some realities you should know about: Operating systems and applications will never be secure. New vulnerabilities will be introduced into your environment every day. And even if you ever do get one operating system secure, there will be new operating systems with new vulnerabilities—phones, wireless devices, and network appliances. Employees will never keep up with security polices and awareness. It doesn't matter how much you train and educate your employees. If your employees disregard warnings about the hazards of opening questionable email attachments, how are you going to educate them about properly configuring firewalls and intrusion detection systems for their PCs? Managers have more responsibility than ever. And on top of the realities listed above. security managers are being asked to support increasing degrees of network availability and access.There are some good security measures you can take: Employ a layer 7, full-inspection firewall. Automatically update your anti-virus at the gateway, server and client. Keep all of your systems and applications updated. Hackers commonly break into a Web site through known security holes, so make sure your servers and applications are patched and up to date. Turn off unnecessary network services. Eliminate all unneeded programs. Scan network for common backdoor services—Use intrusion detection systems, vulnerability scans, antivirus protection.第31题:Which of the following statements of Steve Wozniak, Bill Gates and Linus Torvalds is TRUE?[A] They are all good examples of today's computer users.[B] They are driven by greed, power, revenge, or some other malicious intent.[C] Their goal is to push programs beyond what they are designed to do.[D] They are all dead.

参考答案和解析
正确答案:
1.tired of be fed up with的含义是“厌倦的”。
2.stop plug的原意是“塞住,堵住”,上文提到微软的Windows操作系统容易受到攻击,微软就设计了一系列补丁来防止Windows操作系统受攻击。由此可知plug的意思是stop。
3.Because Microsoft software is increasingly threatened by hackers 文章开头提到Computer Users fed up with hacker attacks and other security threats,“很多的计算机使用者受到黑客的攻击”,第三段也谈到人们对微软的Windows操作系统感到很失望,因为微软的Windows操作系统容易受到黑客的攻击。
4.They were affected by a newly discovered vulnerability 文章倒数第三段第一句话提到Mozilla suffered a setback…counter a newly discovered vulnerability...这段话所隐含的意思是由于微软操作系统非常容易受到病毒的攻击,使得Mozilla互联网浏览器的使用者受到了不少影响。
5.If its browser hadn’t been integrated into Windows. 文章倒数第二段开头一句话指出Microsoft’s security woes stem in part from the way its browser has been integrated into Windows for user convenience.即微软操作系统的安全受到威胁部分是因为微软的使用者为方便把Windows界面与网络浏览器连接在一起,这样就使得微软的操作系统更容易受到病毒的攻击,因而要使微软免于病毒的攻击就只能把浏览器与Windows界面分开。
解析: 暂无解析
更多“问答题Questions 1 to 5 are based on the following passage.  Computer users fed up with hacker attacks and other security threats that exploit holes in Microsoft software are increasingly turning to alternatives such as open source Internet browsers developed”相关问题
  • 第1题:

    The underlined word \\\"hacker\\\" (Para. 1) most probably means \\\"

    The underlined word \\\"hacker\\\" (Para. 1) most probably means \\\"________\\\".

    [A] highly recognizable names behind many of the computer technologies used today

    [B] the negative connotation of those computer users

    [C] a game, employing the tools that are readily available via the Internet

    [D] people who break into computer systems


    正确答案:D
    黑客指的是计算机和网络科技的专家,可以进入计算机系统,所以D是正确答案。

  • 第2题:

    共用题干
    第二篇

    Hack

    The first big-name hackers include Steve Wozniak,Bill Gates and Linus Torvalds,all now highly recog-
    nizable names behind many of the computer technologies used today. These early hackers had a love of tech-
    nology and a compelling need to know how it all worked,and their goal was to push programs beyond what
    they were designed to do.Back then,the word"hacker" didn't have the negative connotation it has today.
    The original hacker ethic,rooted out of simple curiosity and a need to be challenged,appears to be dead.
    The objectives of early hackers are a far cry from the goals of today'S hacker. The motivation of the new
    breed of hackers appears not to be curiosity,or a hunger for knowledge,as it used to be.Instead,most of to-
    day'S hackers are driven by greed,power,revenge,or some other malicious intent,treating hacking as a game
    or sport,employing the tools that are retdily available via the Internet.
    The rate of security attacks is actually outpacing the growth of the Internet.This means that something
    besides the growth of the Internet is driving the rise in security attacks.Here are some realities you should
    know about:Operating systems and applications will never be secure.New vulnerabilities will be introduced
    into your environment every day.And even if you ever do get one operating system secure,there will be new
    operating systems with new vulnerabilities一phones,wireless devices,and network appliances.Employees will
    never keep up with security polices and awareness.It doesn't matter how much you train and educate your
    employees.If your employees disregard warnings about the hazards of opening questionable e-mail attach-
    ments,how are you going to educate them about properly configuring firewalls and intrusion detection systems
    for their PCs?Managers have more responsibility than ever. And on top of the realities listed above,security
    managers are being asked to support increasing degrees of network availability and access.There are some
    good security measures you can take:Employ a layer 7,full-inspection firewall.Automatically update your
    anti-virus at the gateway,server and client. Keep all of your systems and applications updated.Hackers com-
    monly break into a website through known security holes,so make sure your servers and applications are
    patched and up to date.Turn off unnecessary network services.Eliminate all unneeded programs.Scan net-
    work for common backdoor services一use intrusion detection systems,vulnerability scans,anti-virus protection.

    Which of the following statements of Steve Wozniak,Bill Gates and Linus Torvalds is TRUE?
    A:They are all good examples of today's computer users.
    B:They are driven by greed,power,revenge,or some other malicious intent.
    C:Their goal is to push programs beyond what they are designed to do.
    D:They are all dead.

    答案:C
    解析:
    本题的相关信息在文章的第一段。Steve Wozniak , Bill Gates and Linus Torvalds都是一 些早期的著名黑客,不同于现今的黑客,他们出于好奇,勇于挑战计算机和网络科技的漏洞,并 以此推动计算机和网络科技的进步。
    黑客指的是计算机和网络科技方面的专家,可以进人计算机系统,所以D是正确答案。
    依据是第三段中“Employees will never keep up with security polices and awareness.It doesn't matter how much you train and educate your employees”。
    文中与之相关的内容是第三段的“If your employees disregard warnings about the hazards of opening questionable e一mail attachments,how are you going to educate them about properly con- figuring firewalls and intrusion detection systems for their PCs?"。这与B项的意思不一致。
    其依据是第三段倒数第三句“Turn off unnecessary network services.”即关闭不必要的网 络服务,而不是关闭所有的网络服务。一字之差,却相去甚远,要注意辨析。

  • 第3题:

    共用题干
    Hack
    The first big-name hackers included Steve Wozniak,Bill Gates and Linus Torvalds,all now highly recognizable names behind many of the computer technologies used today.These early hackers had a love of technology and a compelling need to know how it all worked,and their goal was to push programs beyond what they were designed to do.Back then,the word“hacker”didn't have the negative connotation it has today.The original hacker ethic,rooted out of simple curiosity and a need to be challenged,appears to be dead.
    The objectives of early hackers are a far cry from the goals of today's hackers.The motivation of the new breed of hackers appears not to be curiosity,or a hunger for knowledge,as it used to be.Instead,most of today's hackers are driven by greed,power,revenge,or some other malicious intent,treating hacking as a game or sport,employing the tools that are readily available via the Internet.
    The rate of security attacks is actually outpacing the growth of the Internet.This means that something besides the growth of the Internet is driving the rise in security attacks.Here are some realities you should know about:Operating systems and applications will never be secure.New vulnerabilities will be introduced into your environment every day.And even if you ever do get one operating system secure,there will be new operating systems with new vu1nerabilities-phones,wireless devices,and network appliances.Employees will never keep up with security policies and awareness.It doesn't matter how much you train and educate your employees.if your employees disregard warnings about the hazards of opening questionable e-mail attachments,how are you going to educate them about properly configuring firewalls and intrusion detection systems for their PCs?Managers have more responsibility than ever.And on top of the realities listed above,security managers are being asked to support increasing degrees of network availability and access.There are some good security measures you can take:Employ a layer 7,full-inspection firewall.Automatically update your anti-virus at the gateway,server and client.Keep all of your systems and applications updated.Hackers commonly break into a website through known security holes,so make sure your servers and applications are patched and up to date.Turn off unnecessary network services.
    Eliminate all unneeded programs.Scan network for common backdoor services一use intrusion detection systems, vulnerability scans,anti-virus protection.

    Which of the following is NOT true of security attacks?
    A:Employees will keep up with security polices and awareness if they are highly-trained.
    B:The rate of security attacks appears faster than the growth of the Internet.
    C:One's computer system will never be secure.
    D:Vulnerabilities can go through phones,wireless devices,and network appliances.

    答案:A
    解析:
    根据第一段第一、二句可知,Steve Wozniak , Bill Gates和Linus Torvalds都是早期的黑客,早期黑客的目标是扩展程序的用途(to push programs beyond what they were designed to do ),故选C项。
    根据第三段倒数第四句“Hackers commonly break into a website …”可知,黑客通常通过已知的安全漏洞侵入电脑系统,所以D项是正确答案。
    第三段第六、七句表明,员工永远不能与安全策略和安全意识的更新保持一致,这跟他们接受多少培训和教育无关。
    由第三段第四句可知,A项表述正确;由第三段第九句可知,C项表述正确;由第三段倒数第八句可知,D项表述正确。由第三段第八句可知,B项的意思与原文表述不一致。
    由第三段倒数第七、四、二句可知,玖C、D三项都正确。第三段倒数第三句提到," Turnoff unnecessary network services.”即关闭不必要的网络服务,而不是关闭所有的网络服务。所以A项不正确。

  • 第4题:

    资料:As more personal business is conducted through smartphone devices , more users are implementing security measures for their devices, according to a recent survey by Harris Poll and commissioned by the CTIA.
    The survey was a part of the company’s ongoing efforts to boost user education on the pitfalls of mobile security and assess whether the CTIA’s initiatives are working.
    It turns out that mobile users in the US have begun implementing many of the initiatives set forth and have increased both awareness of, and protection for, their mobile devices:
    More smartphone users are protecting their devices with PINs and passwords than in previous years. In 2016, of smartphone users had some sort of PIN/password, up from 2015 and form 2012.
    An increasing number of smartphone users have installed built-in remote lock-and-erase software. Of survey respondents, have this type of lock-and-erase software installed, up an astounding from 2015 and from 2012.
    Smartphone users are increasingly aware of the importance of anti-virus software. of smartphone users have an anti-virus software installed, compared with only of smartphone owners in 2015, according to BI Intelligence.
    The survey results indicate that users are becoming increasingly aware of the danger posed by the increasing reliance on mobile technology form not only malicious entities like hackers, but also government surveillance. Specifically, users are increasingly seeking for ways to guard themselves in light of a number of recent high-profile incidents involving phone security–like Apple's case against the FBI, for example.
    Because of this, it will become increasingly common for app developers and device manufactures to build in security and end-to-end encryption. This can be seen in devices and apps such as WhatsApp and iPhones. Developers and device manufacturers that don't include this feature in their products could be faced with negative consumer attitudes.

    According to the passage, _____ of smartphone users had some sort of PIN/password in 2015 and 2012.

    A. and
    B. and
    C. and
    D. and

    答案:C
    解析:
    本题考查的是细节理解。
    【关键词】smartphone users;PIN/password in 2015 and 2012
    【主题句】第四段In 2016, of smartphone users had some sort of PIN/password, up from 2015 and from 2012.(在2016年,的智能手机用户会使用个人识别码/密码,比2015年增长了,比2012年增长了。)
    【解析】本题问“根据文章,在2015年和2012年,百分之多少的智能手机用户会使用个人识别码/密码?”。这是一道数学题,文中说2016年比2015年增长了,所以2015年的比例是,比2012年增长了,所以2012年比例是。英语里“up”表示增长了。

  • 第5题:

    资料:As more personal business is conducted through smartphone devices , more users are implementing security measures for their devices, according to a recent survey by Harris Poll and commissioned by the CTIA.
    The survey was a part of the company’s ongoing efforts to boost user education on the pitfalls of mobile security and assess whether the CTIA’s initiatives are working.
    It turns out that mobile users in the US have begun implementing many of the initiatives set forth and have increased both awareness of, and protection for, their mobile devices:
    More smartphone users are protecting their devices with PINs and passwords than in previous years. In 2016, of smartphone users had some sort of PIN/password, up from 2015 and form 2012.
    An increasing number of smartphone users have installed built-in remote lock-and-erase software. Of survey respondents, have this type of lock-and-erase software installed, up an astounding from 2015 and from 2012.
    Smartphone users are increasingly aware of the importance of anti-virus software. of smartphone users have an anti-virus software installed, compared with only of smartphone owners in 2015, according to BI Intelligence.
    The survey results indicate that users are becoming increasingly aware of the danger posed by the increasing reliance on mobile technology form not only malicious entities like hackers, but also government surveillance. Specifically, users are increasingly seeking for ways to guard themselves in light of a number of recent high-profile incidents involving phone security–like Apple's case against the FBI, for example.
    Because of this, it will become increasingly common for app developers and device manufactures to build in security and end-to-end encryption. This can be seen in devices and apps such as WhatsApp and iPhones. Developers and device manufacturers that don't include this feature in their products could be faced with negative consumer attitudes.

    Which sentence best expresses the main idea of the passage?

    A.Developers and device manufacturers are becoming more aware of security features.
    B.Lack of security features could result in negative consumer attitudes.
    C.Smartphone users are becoming more aware of security features.
    D.Smartphone users are becoming more aware of government surveillance.

    答案:C
    解析:
    本题考查的是主旨大意。
    【关键词】main idea of the passage
    【主题句】第一段 As more personal business is conducted through smartphone devices, more users are implementing security measures for their devices...(由于越来越多的个人业务是通过智能手机操作,更多的手机用户开始为自己的手机提供安全保护。)
    【解析】本题考查本文的主旨中心,主旨应和文章首段有关。根据第一段,作者讨论人们开始关注手机安全,也就是C选项“智能手机用户越来越关注安全特征”。A,B选项只在结尾段有提及Developers and device manufacturers(开发者和手机制造商)that don’t include this feature in their products could be faced with negative consumer attitudes(消费者负面态度)。不是整篇文章论述的中心内容。D选项在第七段中出现The survey results indicate … but also government surveillance(监守),是文章局部信息,不能作为本文主旨。

  • 第6题:

    What can you install on IPCC Express to protect against worms, zero-day viruses, and other immediate security threats?()

    • A、Microsoft Management Console  
    • B、Cisco Security Agent (headless agent)  
    • C、Cisco Security Agent Management Center  
    • D、Microsoft SQL Server 2000

    正确答案:B

  • 第7题:

    A technician wants to decrease the overall attack surface of the servers in a data center through decreasing the number of open network ports on each server. Which of the following could the technician implement to increase security?()

    • A、Host based intrusion detection software
    • B、Software firewall
    • C、NTFS
    • D、ACL

    正确答案:B

  • 第8题:

    You share your computer with other users.  You install a new Microsoft Windows Internet Explorer add-on to view videos on the computer. You discover that this add-on conflicts with existing add-ons that other users frequently require. You need to ensure that you are able to view videos without affecting other users.  What should you do?()

    • A、Uninstall the new Windows Internet Explorer add-on.
    • B、Log on as an administrator and disable the new Windows Internet Explorer add-on.
    • C、Direct other users to log on and disable the new Windows Internet Explorer add-on.
    • D、Select the Turn off Automatic Website Checking option for the Phishing filter.

    正确答案:C

  • 第9题:

    You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail? ()

    • A、Executable
    • B、Trojan
    • C、Virus
    • D、Worm

    正确答案:C,D

  • 第10题:

    Which two statements are true regarding IDP?()

    • A、IDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
    • B、IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.
    • C、IDP inspects traffic up to the Presentation layer.
    • D、IDP inspects traffic up to the Application layer.

    正确答案:A,D

  • 第11题:

    Your computer runs Microsoft Windows XP Professional. You share your computer with two other co-workers.  You purchase a new computer. You install Microsoft Windows Vista on the new computer.  You need to migrate the following content from the old computer to the new computer: All system and program settings  All users settings  Only the content in the C:///Appdata folder  Which tool should you use? ()

    • A、File and Settings Transfer wizard
    • B、Application Compatibility toolkit
    • C、Windows Automated Installation toolkit
    • D、Microsoft Windows Easy Transfer wizard

    正确答案:D

  • 第12题:

    You are the domain administrator for TestKing's Active Directory domain named All client computers run Windows XP Professional. You need to implement a solution for managing security updates on client computers. You plan to use a Windows Server 2003 computer to manage security updates. Your solution for managing security updates must meet the following requirements: 1. You must not purchase additional software or licences. 2. Security updates must be installed automatically. 3. You must be able to control which updates are available to install. 4. Security updates must synchronize automatically with the latest updates offered by Microsoft. You need to implement a solution for managing security updates that meets the requirements. What should you do?()

    • A、Publish the security updates by using a Group Policy object (GPO). Assign the GPO to the client computers that require updates
    • B、Install Software Update Services (SUS). Configure the SUS software to synchronize daily with Microsoft. Use Group Policy to configure the appropriate Windows Update settings on the client computers.
    • C、Install Microsoft Internet Security and Acceleration (ISA) Server on a Windows Server 2003 computer.
    • D、Create a process to run Windows Update on all client computers.

    正确答案:B

  • 第13题:

    Which of the following is NOT true of security attacks?

    [A] Employees will keep up with security polices and awareness if they are highly-trained.

    [B] The rate of security attacks appears faster than the growth of the Internet.

    [C] One's computer system will never be secure.

    [D] Vulnerabilities can go through phones, wireless devices, and network appliances


    正确答案:A
    依据是"Employees will never keep up with security polices and awareness. It doesn't matter how much you train and educate your employees.

  • 第14题:

    共用题干
    第二篇

    Hack

    The first big-name hackers include Steve Wozniak,Bill Gates and Linus Torvalds,all now highly recog-
    nizable names behind many of the computer technologies used today. These early hackers had a love of tech-
    nology and a compelling need to know how it all worked,and their goal was to push programs beyond what
    they were designed to do.Back then,the word"hacker" didn't have the negative connotation it has today.
    The original hacker ethic,rooted out of simple curiosity and a need to be challenged,appears to be dead.
    The objectives of early hackers are a far cry from the goals of today'S hacker. The motivation of the new
    breed of hackers appears not to be curiosity,or a hunger for knowledge,as it used to be.Instead,most of to-
    day'S hackers are driven by greed,power,revenge,or some other malicious intent,treating hacking as a game
    or sport,employing the tools that are retdily available via the Internet.
    The rate of security attacks is actually outpacing the growth of the Internet.This means that something
    besides the growth of the Internet is driving the rise in security attacks.Here are some realities you should
    know about:Operating systems and applications will never be secure.New vulnerabilities will be introduced
    into your environment every day.And even if you ever do get one operating system secure,there will be new
    operating systems with new vulnerabilities一phones,wireless devices,and network appliances.Employees will
    never keep up with security polices and awareness.It doesn't matter how much you train and educate your
    employees.If your employees disregard warnings about the hazards of opening questionable e-mail attach-
    ments,how are you going to educate them about properly configuring firewalls and intrusion detection systems
    for their PCs?Managers have more responsibility than ever. And on top of the realities listed above,security
    managers are being asked to support increasing degrees of network availability and access.There are some
    good security measures you can take:Employ a layer 7,full-inspection firewall.Automatically update your
    anti-virus at the gateway,server and client. Keep all of your systems and applications updated.Hackers com-
    monly break into a website through known security holes,so make sure your servers and applications are
    patched and up to date.Turn off unnecessary network services.Eliminate all unneeded programs.Scan net-
    work for common backdoor services一use intrusion detection systems,vulnerability scans,anti-virus protection.

    Which of the following is NOT true of security attacks?
    A:Employees will keep up with security polices and awareness if they are highly-trained.
    B:The rate of security attacks appears faster than the growth of the Internet.
    C:One's computer system will never be secure.
    D:Vulnerabilities can go through phones,wireless devices,and network appliances.

    答案:A
    解析:
    本题的相关信息在文章的第一段。Steve Wozniak , Bill Gates and Linus Torvalds都是一 些早期的著名黑客,不同于现今的黑客,他们出于好奇,勇于挑战计算机和网络科技的漏洞,并 以此推动计算机和网络科技的进步。
    黑客指的是计算机和网络科技方面的专家,可以进人计算机系统,所以D是正确答案。
    依据是第三段中“Employees will never keep up with security polices and awareness.It doesn't matter how much you train and educate your employees”。
    文中与之相关的内容是第三段的“If your employees disregard warnings about the hazards of opening questionable e一mail attachments,how are you going to educate them about properly con- figuring firewalls and intrusion detection systems for their PCs?"。这与B项的意思不一致。
    其依据是第三段倒数第三句“Turn off unnecessary network services.”即关闭不必要的网 络服务,而不是关闭所有的网络服务。一字之差,却相去甚远,要注意辨析。

  • 第15题:

    共用题干
    Hack
    The first big-name hackers included Steve Wozniak,Bill Gates and Linus Torvalds,all now highly recognizable names behind many of the computer technologies used today.These early hackers had a love of technology and a compelling need to know how it all worked,and their goal was to push programs beyond what they were designed to do.Back then,the word“hacker”didn't have the negative connotation it has today.The original hacker ethic,rooted out of simple curiosity and a need to be challenged,appears to be dead.
    The objectives of early hackers are a far cry from the goals of today's hackers.The motivation of the new breed of hackers appears not to be curiosity,or a hunger for knowledge,as it used to be.Instead,most of today's hackers are driven by greed,power,revenge,or some other malicious intent,treating hacking as a game or sport,employing the tools that are readily available via the Internet.
    The rate of security attacks is actually outpacing the growth of the Internet.This means that something besides the growth of the Internet is driving the rise in security attacks.Here are some realities you should know about:Operating systems and applications will never be secure.New vulnerabilities will be introduced into your environment every day.And even if you ever do get one operating system secure,there will be new operating systems with new vu1nerabilities-phones,wireless devices,and network appliances.Employees will never keep up with security policies and awareness.It doesn't matter how much you train and educate your employees.if your employees disregard warnings about the hazards of opening questionable e-mail attachments,how are you going to educate them about properly configuring firewalls and intrusion detection systems for their PCs?Managers have more responsibility than ever.And on top of the realities listed above,security managers are being asked to support increasing degrees of network availability and access.There are some good security measures you can take:Employ a layer 7,full-inspection firewall.Automatically update your anti-virus at the gateway,server and client.Keep all of your systems and applications updated.Hackers commonly break into a website through known security holes,so make sure your servers and applications are patched and up to date.Turn off unnecessary network services.
    Eliminate all unneeded programs.Scan network for common backdoor services一use intrusion detection systems, vulnerability scans,anti-virus protection.

    Which of the following statements of Steve Wozniak,Bill Gates and Linus Torvalds is true?
    A:They are all good examples of today's computer users.
    B:They are driven by greed,power,revenge,or some other malicious intent.
    C:Their goal is to push programs beyond what they are designed to do.
    D:They are all dead.

    答案:C
    解析:
    根据第一段第一、二句可知,Steve Wozniak , Bill Gates和Linus Torvalds都是早期的黑客,早期黑客的目标是扩展程序的用途(to push programs beyond what they were designed to do ),故选C项。
    根据第三段倒数第四句“Hackers commonly break into a website …”可知,黑客通常通过已知的安全漏洞侵入电脑系统,所以D项是正确答案。
    第三段第六、七句表明,员工永远不能与安全策略和安全意识的更新保持一致,这跟他们接受多少培训和教育无关。
    由第三段第四句可知,A项表述正确;由第三段第九句可知,C项表述正确;由第三段倒数第八句可知,D项表述正确。由第三段第八句可知,B项的意思与原文表述不一致。
    由第三段倒数第七、四、二句可知,玖C、D三项都正确。第三段倒数第三句提到," Turnoff unnecessary network services.”即关闭不必要的网络服务,而不是关闭所有的网络服务。所以A项不正确。

  • 第16题:

    资料:As more personal business is conducted through smartphone devices , more users are implementing security measures for their devices, according to a recent survey by Harris Poll and commissioned by the CTIA.
    The survey was a part of the company’s ongoing efforts to boost user education on the pitfalls of mobile security and assess whether the CTIA’s initiatives are working.
    It turns out that mobile users in the US have begun implementing many of the initiatives set forth and have increased both awareness of, and protection for, their mobile devices:
    More smartphone users are protecting their devices with PINs and passwords than in previous years. In 2016, of smartphone users had some sort of PIN/password, up from 2015 and form 2012.
    An increasing number of smartphone users have installed built-in remote lock-and-erase software. Of survey respondents, have this type of lock-and-erase software installed, up an astounding from 2015 and from 2012.
    Smartphone users are increasingly aware of the importance of anti-virus software. of smartphone users have an anti-virus software installed, compared with only of smartphone owners in 2015, according to BI Intelligence.
    The survey results indicate that users are becoming increasingly aware of the danger posed by the increasing reliance on mobile technology form not only malicious entities like hackers, but also government surveillance. Specifically, users are increasingly seeking for ways to guard themselves in light of a number of recent high-profile incidents involving phone security–like Apple's case against the FBI, for example.
    Because of this, it will become increasingly common for app developers and device manufactures to build in security and end-to-end encryption. This can be seen in devices and apps such as WhatsApp and iPhones. Developers and device manufacturers that don't include this feature in their products could be faced with negative consumer attitudes.

    According to the passage, why CTIA conducted the survey?

    A.Implement security measures for smart devices and protect the security.
    B.Boost user education on the pitfalls of mobile security and assess whether the initiatives are working.
    C.Boost user education on the apps and test the security of them.
    D.None of above.

    答案:B
    解析:
    本题考查的是细节理解。
    【关键词】why;CTIA; survey
    【主题句】第二段The survey was a part of the company’s ongoing efforts to boost user education on the pitfalls of mobile security and assess whether the CTIA’s initiatives are working.(该调查是公司持续推进项目的一部分,旨在提高用户在手机隐患方面的教育水平,同时评定CTIA的计划是否起作用。)
    【解析】本题问“根据文章,CTIA为什么要进行调查?”。题目在问此次调查的目的是什么?根据原文to boost…表示目的,因此后面就是调查的原因boost user education on the pitfalls of mobile security and assess whether the CTIA’s initiatives are working. (旨在提高用户在手机隐患方面的教育水平,同时评定CTIA的计划是否起作用),即B选项。另外三个选项均与题目和主题句不符。

  • 第17题:

    资料:As more personal business is conducted through smartphone devices , more users are implementing security measures for their devices, according to a recent survey by Harris Poll and commissioned by the CTIA.
    The survey was a part of the company’s ongoing efforts to boost user education on the pitfalls of mobile security and assess whether the CTIA’s initiatives are working.
    It turns out that mobile users in the US have begun implementing many of the initiatives set forth and have increased both awareness of, and protection for, their mobile devices:
    More smartphone users are protecting their devices with PINs and passwords than in previous years. In 2016, of smartphone users had some sort of PIN/password, up from 2015 and form 2012.
    An increasing number of smartphone users have installed built-in remote lock-and-erase software. Of survey respondents, have this type of lock-and-erase software installed, up an astounding from 2015 and from 2012.
    Smartphone users are increasingly aware of the importance of anti-virus software. of smartphone users have an anti-virus software installed, compared with only of smartphone owners in 2015, according to BI Intelligence.
    The survey results indicate that users are becoming increasingly aware of the danger posed by the increasing reliance on mobile technology form not only malicious entities like hackers, but also government surveillance. Specifically, users are increasingly seeking for ways to guard themselves in light of a number of recent high-profile incidents involving phone security–like Apple's case against the FBI, for example.
    Because of this, it will become increasingly common for app developers and device manufactures to build in security and end-to-end encryption. This can be seen in devices and apps such as WhatsApp and iPhones. Developers and device manufacturers that don't include this feature in their products could be faced with negative consumer attitudes.

    In what way shows that people have increased awareness of and protection for their mobile devices?

    A.Smartphone users are increasingly aware of the importance of anti-virus software.
    B.An increasing number of smartphone users have installed built-in remote lock-and-erase software.
    C.More smartphone users are protecting their devices with PINs and passwords than in previous years.
    D.All of above.

    答案:D
    解析:
    本题考查的是细节理解。
    【关键词】in what way;awareness of and protection; mobile devices
    【主题句】第四段More smartphone users are protecting their devices with PINs and passwords than in previous years.(和前几年相比,越来越多的智能手机用户通过个人识别码和密码来保护个人手机。);第五段An increasing number of smartphone users have installed built-in remote lock-and-erase software.(越来越多的智能手机用户安装了内置远程锁定清除软件。);第六段Smartphone users are increasingly aware of the importance of anti-virus software.(智能手机用户越来越意识到杀毒软件的重要性。)
    【解析】本题问“如何体现出人们提高了保护手机的意识?”。根据文章第4,5,6段的内容(主题句),得出通过设置密码和安装软件的方式来保护手机,只有D选项是涵盖了这三个方面。

  • 第18题:

    The Company is concerned about Layer 2 security threats.  Which statement is true about these  threats? ()

    • A、 MAC spoofing attacks allow an attacking device to receive frames intended for a different  network host.
    • B、 Port scanners are the most effective defense against dynamic ARP inspection.
    • C、 MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable  attack points.
    • D、 Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP  snooping attacks.
    • E、 DHCP snooping sends unauthorized replies to DHCP queries.
    • F、 ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.
    • G、 None of the other alternatives apply.

    正确答案:A

  • 第19题:

    You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. All client computers run Windows XP Professional, and all client computer objects are store din the Clients organizational unit (OU). Client computers receive critical security patches from servers at Microsoft. A server named Testking1 runs Software Update Services (SUS). You enable Testking1 to obtain and store security patches for distribution on the internal network. Now you need to ensure that all client computers receive future security patches from Testking1 only. You open the Group Policy object (GPO) for the Clients OU. Which setting should you configure?()

    • A、Computer Configuration/Software Settings/Software Installation
    • B、User Configuration/Software Settings/Software Installation
    • C、Computer Configuration/Administrative Templates/Windows Components/Windows Installer
    • D、User Configuration/Administrative Templates/Windows Components/Windows Installer
    • E、Computer Configuration/Administrative Templates/Windows Components/Windows Update
    • F、User Configuration/Administrative Templates/Windows Components/Windows Update

    正确答案:E

  • 第20题:

    You are responsible for increasing the security within the Company LAN. Of the following choices  listed below,  which is true regarding layer 2 security and mitigation techniques? ()

    • A、 Enable root guard to mitigate ARP address spoofing attacks.
    • B、 Configure DHCP spoofing to mitigate ARP address spoofing attacks.
    • C、 Configure PVLANs to mitigate MAC address flooding attacks.
    • D、 Enable root guard to mitigate DHCP spoofing attacks.
    • E、 Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted  ports.
    • F、 Configure port security to mitigate MAC address flooding  
    • G、 None of the other alternatives apply

    正确答案:F

  • 第21题:

    Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()

    • A、Honeynet
    • B、Honeypot
    • C、Vulnerability scanner
    • D、Network based IDS

    正确答案:A

  • 第22题:

    Your network contains a public computer that runs Windows 7. Multiple users log on to the computer byusing a local user account named User1. Users report that they can log on to some secure Web sites byusing credentials that were saved by other users. You need to prevent forms-based credentials from beingsaved on the computer.  What should you do?()

    • A、Remove all generic credentials from Windows Vault.
    • B、Remove all Windows credentials from Windows Vault.
    • C、Modify the Windows Internet Explorer certificates settings.
    • D、Modify the Windows Internet Explorer AutoComplete settings.

    正确答案:D

  • 第23题:

    You need to reduce the level of access that a malicious Web site might have to your computer.  What should you do? ()

    • A、Start a Windows Defender scan.
    • B、Enable Microsoft Windows Internet Explorer Phishing Filter.
    • C、Enable Microsoft Windows Internet Explorer Pop-up Blocker.
    • D、Confirm that Microsoft Windows Internet Explorer Protected Mode is enabled on the Internet security zone.

    正确答案:D