问题 单项选择题

To compete in today’s fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their internal enterprise networks. These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become ___19___. Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources to ___20___ activity. For many organizations, however, the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty-two percent of surveyed CISOs state that they currently use a moat and castle’s security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch ___21___ of service attacks or steal ___22___ information by snooping the network. As they access the corporate network, mobile and remote users inadvertently can infect the network with ___23___ and worms acquired from unprotected public networks. Hackers masquerading as internal users can take advantage of weak internal security to gain access to confidential information.

23()

A.sickness

B.disease

C.germs

D.viruses

答案

参考答案:D

解析:

为了参与如今迅速发展的竞争环境,各种组织逐渐允许承包商、合伙人、游客和嘉宾访问他们的内部企业网。这些用户可能通过在会议室或办公室的有线端口连接网络,也可能通过无线访问点来连接网络。由于允许第三方的开放式访问,因此局域网变得很脆弱(vulnerable)。第三方可能通过各种途径引入风险,从被感染的移动终端进行未经授权的网络资源访问,到恶意的(malicious)活动都会出现。然而对很多组织来说,操作的复杂性和保证第三方安全地访问网络的费用都是难以承受的。根据CISO的调查,52%的用户使用了城堡式的安全方案,但是网络内部的防卫却是很脆弱的。来自内部用户的安全威胁正成为网络安全关注的焦点。心怀叵测的员工可以发动拒绝(denial)服务攻击或通过嗅探网络来窃取机密(confidential)信息。当移动用户或远程用户访问公司网络时,他们可能从未经保护的公网上不经意地引入病毒(viruses)和蠕虫。伪装成内部用户的黑客们会利用脆弱的内部安全来获取机密信息。

阅读理解与欣赏
单项选择题