黄色在线观看视频-黄色在线免费看-黄色在线视频免费-黄色在线视频免费看-免费啪啪网-免费啪啪网站

首頁 - 網校 - 萬題庫 - 美好明天 - 直播 - 導航
熱點搜索
學員登錄 | 用戶名
密碼
新學員
老學員
您現在的位置: 考試吧 > 考研 > 考研模擬試題 > 考研英語模擬試題 > 綜合輔導 > 正文

2010年考研《英語一》考前沖刺試卷及解析(2)

來源:新東方 2010-1-6 13:20:01 要考試,上考試吧! 考研萬題庫

  Text 3

  The first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, all now highly recognizable names behind many of the computer technologies used today. These early hackers had a love of technology and a compelling need to know how it all worked, and their goal was to push programs beyond what they were designed to do. Back then, the word "hacker" didn't have the negative connotation it has today. The original hacker ethic, rooted out of simple curiosity and a need to be challenged, appears to be dead.

  The objectives of early hackers are a far cry from the goals of today's hacker. The motivation of the new breed of hackers appears not to be curiosity, or a hunger for knowledge, as it used to be. Instead, most of today's hackers are driven by greed, power, revenge, or some other malicious intent, treating hacking as a game or sport, employing the tools that are readily available via the Internet.

  The rate of security attacks is actually outpacing the growth of the Internet. This means that something besides the growth of the Internet is driving the rise in security attacks. Here are some realities you should know about: Operating systems and applications will never be secure. New vulnerabilities will be introduced into your environment every day. And even if you ever do get one operating system secure, there will be new operating systems with new vulnerabilities—phones, wireless devices, and network appliances. Employees will never keep up with security polices and awareness. It doesn't matter how much you train and educate your employees. If your employees disregard warnings about the hazards of opening questionable email attachments, how are you going to educate them about properly configuring firewalls and intrusion detection systems for their PCs? Managers have more responsibility than ever. And on top of the realities listed above. security managers are being asked to support increasing degrees of network availability and access.

  There are some good security measures you can take: Employ a layer 7, full-inspection firewall. Automatically update your anti-virus at the gateway, server and client. Keep all of your systems and applications updated. Hackers commonly break into a Web site through known security holes, so make sure your servers and applications are patched and up to date. Turn off unnecessary network services. Eliminate all unneeded programs. Scan network for common backdoor services—Use intrusion detection systems, vulnerability scans, antivirus protection.

  31. Which of the following statements of Steve Wozniak, Bill Gates and Linus Torvalds is TRUE?

  [A] They are all good examples of today's computer users.

  [B] They are driven by greed, power, revenge, or some other malicious intent.

  [C] Their goal is to push programs beyond what they are designed to do.

  [D] They are all dead.

  32. The underlined word "hacker" (Para. 1) most probably means "________".

  [A] highly recognizable names behind many of the computer technologies used today

  [B] the negative connotation of those computer users

  [C] a game, employing the tools that are readily available via the Internet

  [D] people who break into computer systems

  33. Which of the following is NOT true of security attacks?

  [A] Employees will keep up with security polices and awareness if they are highly-trained.

  [B] The rate of security attacks appears faster than the growth of the Internet.

  [C] One's computer system will never be secure.

  [D] Vulnerabilities can go through phones, wireless devices, and network appliances.

  34. What is the most important one among the realities listed?

  [A] New vulnerabilities will be introduced into your environment every day.

  [B] If employees disregard warnings about the hazards of opening questionable email attachments, the manager should educate them about properly configuring firewalls and intrusion detection systems for their PCs.

  [C] Managers have more responsibility than ever.

  [D] Security managers are asked to support increasing degrees of network availability and access.

  35. Various security measures are recommended EXCEPT ________.

  [A] turning off network services

  [B] employing a full-inspection firewall

  [C] making sure that servers and applications are patched

  [D] eliminating all unneeded programs

  Text 4

  A writer said yesterday that Richard M. Scrushy, the former chief executive of HealthSouth, paid her through a public relations firm to produce several favorable articles for an Alabama newspaper that he reviewed before publication during his fraud trial last year.

  The articles appeared in The Birmingham Times, a black-owned weekly in Birmingham, Ala. Mr. Scrushy was acquitted in June in a six-month trial there on all 36 counts against him, despite testimony from former HealthSouth executives who said he presided over a huge accounting fraud. "I sat in that courtroom for six months, and I did every thing possible to advocate for his cause," Audrey Lewis, the author of the articles, said in a telephone interview. She said she received $10,000 from Mr. Scrushy through the Lewis Group, a public relations firm, and another $1,000 to help buy a computer. "Scrushy promised me a lot more than what I got," she said.

  Charles A. Russell, a spokesman for Mr. Scrushy, said he was not aware of an explicit agreement for the Lewis Group to pay Ms. Lewis. The payments to Ms. Lewis were first reported by The Associated Press yesterday. "There's nothing there I think Richard would have any part of," Mr. Russell said.

  Mr. Russell said that Mr. Scrushy reviewed the articles before they were published. "Richard thought she was doing a little, 'F.Y.I., here's what I'm writing,' " Mr. Russell said. Ms. Lewis said that Mr. Russell, a prominent Denver-based crisis communications consultant, was also involved in providing her with financial compensation. She said Mr. Russell wrote her a $2,500 personal check at the end of May 2005; Mr. Russell said that was true. "She was looking for freelance community-relations work after the trial," Mr. Russell said.

  Ms. Lewis came into Mr. Scrushy's sphere through Believers Temple Church; she attends services and works as an administrator there. She and Rev. Herman Henderson, the pastor, were part of a group that appeared in court with Mr. Scrushy and often prayed with him during breaks. Before and during the trial, in which 11 of the 18 jurors were black, Mr. Scrushy, who is white, forged ties with Birmingham's African-American population. He joined a predominantly black church, and his foundation donated to it and other black congregations.

  Mr. Henderson also said he received payments from Mr. Scrushy in exchange for building support for him among blacks. Mr. Scrushy said in a statement yesterday that his foundation donated money to Mr. Henderson's church, but said the payments were unrelated to his case. "My foundation donated to his church building fund and to a Katrina relief effort that his church sponsored," Mr. Scrushy said. "That's it. Period."

  Ms. Lewis, 31, said she was disclosing details about the financial arrangement because Mr. Scrushy still owes her and Mr. Henderson a significant amount of money. Ms. Lewis provided copies of a retainer agreement that Mr. Scrushy signed last April with the Lewis Group, a public relations firm controlled by Jesse J. Lewis Sr., 82 the founder of The Birmingham Times, and a check issued to her in May from the Lewis Group. (Ms Lewis and Mr. Lewis are not related.)

  36. The word "acquitted" (Line 2, Para. 2) probably means ________.

  A. discharged

  B. arrested

  C. quitted

  D. punished

  37. Mr. Russell said Richard had nothing to do with the agreement mentioned because ________.

  A. Richard didn't want to pay money he owed Ms. Lewis

  B. this may affect the trial

  C. this may ruin Richard's reputation

  D. he knew that was the fact

  38. Mr. Scrushy made donations to the black groups probably because ________.

  A. he had close relations with Birmingham's African-American population

  B. he wanted the church to set up more buildings

  C. he was very benevolent

  D. he wanted to get support from the blacks in his trial

  39. The last paragraph implies that ________.

  A. Mr. Scrushy told a lie

  B. Ms. Lewis will get the money Mr. Scrushy owes her

  C. the Lewis Group may be a go-between

  D. Mr. Scrushy will be involved in the trial again

  40. From the text we can conclude that the author ________.

  A. is supportive of Mr. Scrushy

  B. favors Ms. Lewis's side

  C. takes a detached attitude

  D. is sympathetic

上一頁  1 2 3 4 5 下一頁
2010年考生必讀:
文章搜索
萬題庫小程序
萬題庫小程序
·章節視頻 ·章節練習
·免費真題 ·模考試題
微信掃碼,立即獲取!
掃碼免費使用
考研英語一
共計364課時
講義已上傳
53214人在學
考研英語二
共計30課時
講義已上傳
5495人在學
考研數學一
共計71課時
講義已上傳
5100人在學
考研數學二
共計46課時
講義已上傳
3684人在學
考研數學三
共計41課時
講義已上傳
4483人在學
推薦使用萬題庫APP學習
掃一掃,下載萬題庫
手機學習,復習效率提升50%!
版權聲明:如果考研網所轉載內容不慎侵犯了您的權益,請與我們聯系800@exam8.com,我們將會及時處理。如轉載本考研網內容,請注明出處。
官方
微信
掃描關注考研微信
領《大數據寶典》
下載
APP
下載萬題庫
領精選6套卷
萬題庫
微信小程序
幫助
中心
文章責編:zhangyuqiong  主站蜘蛛池模板: 一级a毛片免费观看久久精品 | 欧美国产成人一区二区三区 | 国产一区二区三区影院 | 日韩一级生活片 | 快播制服丝袜 | 综合精品在线 | 狠狠操免费视频 | 伦理片第一页 | 综合网色 | 最近日本中文字幕免费完整 | 欧美高清一级 | 日本经典在线三级视频 | 三级色网站 | 日韩大片免费看 | 国产成人爱情动作片在线观看 | 久久综合丝袜长腿丝袜 | 在线三区| 91在线欧美 | 日本韩国在线 | 日本免费全黄一级裸片视频 | 天天曰天天干天天操 | 精品国产一区二区三区免费 | 巨胸喷奶水www久久久 | 国内精品视频在线观看 | 成人免费片 | 91网站网站网站在线 | 一区二区三区免费在线视频 | 在线观看你懂的网站 | 欧美色精品天天在线观看视频 | 国产视频网站在线观看 | 国产一级久久免费特黄 | 日日天干夜夜人人添 | 精品日韩二区三区精品视频 | 欧美成人私人视频88在线观看 | 人人草人人爽 | 亚洲欧美日韩综合在线播放 | 欧美精品亚洲精品日韩专区va | 最近中文字幕完整视频大全版 | 天天夜天天干 | 一区在线免费观看 | 俄罗斯高清freexxxx性 |