单选

In the following essay, each blank has four choices. Choose the best answer and write down on the answer sheet.

 In security, an(71)is a form. of possible loss or harm in a computing system; examples of exposures are unauthorized disclosure of data, modification of data, or(72)of legitimate access to computing. A vulnerability is a weakness in the security system that might be exploited to cause loss or harm. A human who exploits a vulnerability perpetrates an attack on the system. Threats to computing systems are circumstances that have the potential to cause loss or harm; human attacks are examples of threats, as are natural disasters, inadvertent human errors, and internal hardware or software(73). Finally, a control is a protective measure an action, a device, a procedure, or a technique - that reduces a vulnerability.  The major(74)of computing systems are hardware, software, and data. There are four kinds of threats to the security of a computing system: interruption, interception, modification, and(75). The four threats all exploit vulnerabilities of the assets in computing systems.

  • A.betrayal
  • B.uncover
  • C.emerge
  • D.exposure
参考答案
您可能感兴趣的试题

(82)

  • A.fabrication
  • B.falsification
  • C.stealing
  • D.rebuild

(79)

  • A.decline
  • B.rejection
  • C.refusal
  • D.denial

(81)

  • A.reason
  • B.assets
  • C.possession
  • D.component

(80)

  • A.problems
  • B.flaws
  • C.defect
  • D.shortcoming

(77)

  • A.search engine
  • B.search tools
  • C.database
  • D.computer

(74)

  • A.relevant
  • B.irrelevant
  • C.complicated
  • D.complex

(75)

  • A.concrete
  • B.special
  • C.specific
  • D.particular

(76)

  • A.seeing
  • B.searching
  • C.browsing
  • D.looking for
¥

订单号:

遇到问题请联系在线客服

订单号:

遇到问题请联系在线客服