Most computer systems are (66) to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be (67) to an outsider attack by preventing (68) from outside can still be vulnerable to the insider attacks accomplished by abusive usage of (69) users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually (70) by tools referred to as Intrusion Detection Systems.
(67)处填()。
A.reliable
B.secure
C.indestructible
D.steady
A.执行态
B.目态
C.管态
D.就绪态
A.1/2
B.1
C.2
D.4
A.字节
B.字
C.数据块
D.位
A.对象图
B.状态图
C.流程图
D.结构图
A.2
B.3
C.4
D.5
A.电路交换
B.报文交换
C.分组交换
D.B和C
A.阶码
B.符号
C.尾数
D.基数
A.2h-1
B.2h
C.2h-1
D.2h
A.254
B.255
C.256
D.257
A.999
B.1000
C.1001
D.1002
A.串的模式匹配
B.求子串
C.求串的长度
D.串的连接
A.9
B.10
C.11
D.12
A.地方标准
B.地区标准
C.专业标准
D.行业标准
A.继承性
B.共享性
C.封装性
D.抽象性
A.Cache
B.寄存器
C.内存
D.外存
A.树型
B.网状型
C.星型
D.环型