教学文库网 - 权威文档分享云平台
您的当前位置:首页 > 精品文档 > 高等教育 >

高职高专第9章教参(4)

来源:网络收集 时间:2026-01-22
导读: right column. 1. administrator account A. 网购 2. access control list B. 强口令 3. default share C. 独立服务器 4. data-driven attack D. 访问控制列表 5. logon E. 管理员帐号 6. mirror site F. 缺省共享

right column.

1. administrator account A. 网购 2. access control list B. 强口令 3. default share C. 独立服务器 4. data-driven attack D. 访问控制列表 5. logon E. 管理员帐号 6. mirror site F. 缺省共享 7. strong password G. 数据驱动攻击 8. hub H. 登录 9. net purchase I. 镜像站点 10. standalone server J. 集线器

1. E 2. D 3. F 4. G 5. H 6. I 7. B 8. J 9.A 10. C

III. Fill in each of the blanks with one of the words or expressions in the box, making changes if necessary:

hack however

DOS here means Denial Of Service (拒绝服务).Its attack consists of ______ (1) the server so that it is unable to fulfill requests. This can lead to other users being unable to ___(2) it or even to crashing the machine.

Then there is DDOS attack, which is even ______ (3) if it is done correctly. DDOS stands for Distributed Denial Of Service (分布式拒绝服务). In this type of attack, many machines, which often are ______ (4) or virus infected computers without owners actually knowing it, are used to send the overloading _____ (5). This can obviously ______ (6) something much more damaging than a simple DOS attack.

You can defend against a DOS attack by not ______ (7) too many requests in short time from one computer. _____ (8), defending against a DDOS attack is very difficult if not impossible. You can simply _____ (9) requests that the server is unable to answer, but

allow overload

handle request

drop dangerous

lead to access

this harms innocent users who are trying to access your server. Or, of course, you can get some kind of super-server that will ______ (10) almost any amount of requests, but that takes a lot of money.

1. overloading 2. access 3. more dangerous 4. hacked 5. requests 6. lead to 7. allowing 8. However 9. drop 10. handle

IV. Translate the following sentences from English into Chinese.

1. Macro viruses are embedded in data files, such as files produced by Microsoft Office.

宏病毒嵌入数据文件,如由微软Office软件生成的文件。

2. Sometimes, users’ overconfidence plays an important role in allowing networks to be intruded

upon.

有时,用户的过度自信对网络被入侵负有重要责任。

3. As more and more people become “wired”, an increasing number of people need to

understand the basics of security in a networked world. 随着越来越多的人“触网”,越来越多的人需要了解网络安全常识。

4. 90% of security safeguards rely on the computer user to adhere to good computing practices.

90%安全保护措施依赖于计算机用户遵守正确的操作行为。

5. Remember that information and passwords sent via standard, unencrypted wireless are

especially easy for hackers to intercept.

请记住,用标准、未加密的无线方式传送信息和密码,特别容易被黑客截获。

…… 此处隐藏:508字,全部文档内容请下载后查看。喜欢就下载吧 ……
高职高专第9章教参(4).doc 将本文的Word文档下载到电脑,方便复制、编辑、收藏和打印
本文链接:https://www.jiaowen.net/wendang/608967.html(转载请注明文章来源)
Copyright © 2020-2025 教文网 版权所有
声明 :本网站尊重并保护知识产权,根据《信息网络传播权保护条例》,如果我们转载的作品侵犯了您的权利,请在一个月内通知我们,我们会及时删除。
客服QQ:78024566 邮箱:78024566@qq.com
苏ICP备19068818号-2
Top
× 游客快捷下载通道(下载后可以自由复制和排版)
VIP包月下载
特价:29 元/月 原价:99元
低至 0.3 元/份 每月下载150
全站内容免费自由复制
VIP包月下载
特价:29 元/月 原价:99元
低至 0.3 元/份 每月下载150
全站内容免费自由复制
注:下载文档有可能出现无法下载或内容有问题,请联系客服协助您处理。
× 常见问题(客服时间:周一到周五 9:30-18:00)