问题详情

To compete in today's fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their internal enterprise networks.These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become(6) .Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources to(7)activity. For many organizations, however,the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty-two percent of surveyed CISOs state that they currently use a moat and castle's security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch (8) of service attacks or steal (9) information by snooping the network. As they access the corporate network, mobile and remote users inadvertently can infect the network with (10) and worms acquired from unprotected public networks. Hackers masquer-ading as internal users can take advantage of weak internal security to gain access to confidential information.空白处(6)应选择()

A、damageable

B、susceptible

C、wlnerable

D、changeable

未搜索到的试题可在搜索页快速提交,您可在会员中心"提交的题"快速查看答案。 收藏该题
查看答案

相关问题推荐

When the system upon which a transport entity is running fails and subsequently restarts,the(21) information of all active connections is lost. The affected connections become half-open, as the side that did not fail does not yet realize the problem.The still active side of a half-open connections can close the connection using a(22)timer. This timer measures the time the transport machine will continue to await an (23) of a transmitted segment after the segment has been retransmitted the maximum number of times.When the timer (24),the transport entity assumes that either the other transport entity or the intervening network has failed. As a result, the timer closes the connection, and signals an abnormal close to the TS user. In the event that a transport entity fails and quickly restarts, half-open connections can be terminated more quickly by the use of the RST segment, the failed side returns an RST i to every segment i that it receives. When the RST i reaches the other side, it must be checked for validity based on the (25) number i, as the RST could be in response to an old segment. If the reset is valid, the transport entity performs an abnormal termination.空白处(25)应选择()

A、sequence

B、acknowledgment

C、connection

D、message

WLANs are increasingly popular because they enable cost-effective connections among people, applications and data that were not possible, or not cost-effective, in the past. For example, WLAN-based applications can enable fine-grained management of supply and distribution (1) to improve their efficienty and reduce (2) .WLANs can also enable entirely new business processes. To cite but one example, hospitals are using WLAN-enabled point-of-care applications to reduce errors and improve overall (3) care. WLAN management solutions provide a variety of other benefits that can be substantial but difficult to measure. For example, they can protect corporate data by preventing (4) through rogue access points. They help control salary costs, by allowing IT staffs to manage larger networks without adding staff. And they can improve overall network mananement by integrating with customers' existing systems, such as OpenView and UniCenter. Fortunately, it isn't necessary to measure these benefits to justify investing in WLAN management solutions, which can quickly pay for themselves simply by minimizing time-consuming(5) and administrative chores.空白处(1)应选择()

A、chores

B、chains

C、changes

D、links

Astute service providers realize that the continued support of legacy X.25 and asynchronous network element using separate operations network is cost(16).For example,the maintenance of multiple networks can require additional staff. Often, this staff must be trained on multiple vendor technologies, sometimes requiring parallel groups specializing in each (17) .Hence, additional maintenance procedures must be maintained and administrative records are (18) .The duplication of transport facilities to carry (19)network traffic is an inefficient use of resources. And not surprisingly, more technologies installed in a central office means the necessity for more physical space, and an increase in power connections and power consumption migration of these (20) network elements to IP-based DCns is alogical strategy.空白处(20)应选择()

A、raditional

B、dominancy

C、redundancy

D、legacy

To compete in today's fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their internal enterprise networks.These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become(6) .Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources to(7)activity. For many organizations, however,the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty-two percent of surveyed CISOs state that they currently use a moat and castle's security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch (8) of service attacks or steal (9) information by snooping the network. As they access the corporate network, mobile and remote users inadvertently can infect the network with (10) and worms acquired from unprotected public networks. Hackers masquer-ading as internal users can take advantage of weak internal security to gain access to confidential information.空白处(7)应选择()

A、venomous

B、malicious

C、felonious

D、villainous

When the system upon which a transport entity is running fails and subsequently restarts,the(21) information of all active connections is lost. The affected connections become half-open, as the side that did not fail does not yet realize the problem.The still active side of a half-open connections can close the connection using a(22)timer. This timer measures the time the transport machine will continue to await an (23) of a transmitted segment after the segment has been retransmitted the maximum number of times.When the timer (24),the transport entity assumes that either the other transport entity or the intervening network has failed. As a result, the timer closes the connection, and signals an abnormal close to the TS user. In the event that a transport entity fails and quickly restarts, half-open connections can be terminated more quickly by the use of the RST segment, the failed side returns an RST i to every segment i that it receives. When the RST i reaches the other side, it must be checked for validity based on the (25) number i, as the RST could be in response to an old segment. If the reset is valid, the transport entity performs an abnormal termination.空白处(21)应选择()

A、data

B、state

C、signal

D、control

联系客服 会员中心
TOP