Text 3
The first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, all now highly recognizable names behind many of the computer technologies used today. These early hackers had a love of technology and a compelling need to know how it all worked, and their goal was to push programs beyond what they were designed to do. Back then, the word "hacker" didn't have the negative connotation it has today. The original hacker ethic, rooted out of simple curiosity and a need to be challenged, appears to be dead.
The objectives of early hackers are a far cry from the goals of today's hacker. The motivation of the new breed of hackers appears not to be curiosity, or a hunger for knowledge, as it used to be. Instead, most of today's hackers are driven by greed, power, revenge, or some other malicious intent, treating hacking as a game or sport, employing the tools that are readily available via the Internet.
The rate of security attacks is actually outpacing the growth of the Internet. This means that something besides the growth of the Internet is driving the rise in security attacks. Here are some realities you should know about: Operating systems and applications will never be secure. New vulnerabilities will be introduced into your environment every day. And even if you ever do get one operating system secure, there will be new operating systems with new vulnerabilities—phones, wireless devices, and network appliances. Employees will never keep up with security polices and awareness. It doesn't matter how much you train and educate your employees. If your employees disregard warnings about the hazards of opening questionable email attachments, how are you going to educate them about properly configuring firewalls and intrusion detection systems for their PCs? Managers have more responsibility than ever. And on top of the realities listed above. security managers are being asked to support increasing degrees of network availability and access.
There are some good security measures you can take: Employ a layer 7, full-inspection firewall. Automatically update your anti-virus at the gateway, server and client. Keep all of your systems and applications updated. Hackers commonly break into a Web site through known security holes, so make sure your servers and applications are patched and up to date. Turn off unnecessary network services. Eliminate all unneeded programs. Scan network for common backdoor services—Use intrusion detection systems, vulnerability scans, antivirus protection.
31. Which of the following statements of Steve Wozniak, Bill Gates and Linus Torvalds is TRUE?
[A] They are all good examples of today's computer users.
[B] They are driven by greed, power, revenge, or some other malicious intent.
[C] Their goal is to push programs beyond what they are designed to do.
[D] They are all dead.
32. The underlined word "hacker" (Para. 1) most probably means "________".
[A] highly recognizable names behind many of the computer technologies used today
[B] the negative connotation of those computer users
[C] a game, employing the tools that are readily available via the Internet
[D] people who break into computer systems
33. Which of the following is NOT true of security attacks?
[A] Employees will keep up with security polices and awareness if they are highly-trained.
[B] The rate of security attacks appears faster than the growth of the Internet.
[C] One's computer system will never be secure.
[D] Vulnerabilities can go through phones, wireless devices, and network appliances.
34. What is the most important one among the realities listed?
[A] New vulnerabilities will be introduced into your environment every day.
[B] If employees disregard warnings about the hazards of opening questionable email attachments, the manager should educate them about properly configuring firewalls and intrusion detection systems for their PCs.
[C] Managers have more responsibility than ever.
[D] Security managers are asked to support increasing degrees of network availability and access.
35. Various security measures are recommended EXCEPT ________.
[A] turning off network services
[B] employing a full-inspection firewall
[C] making sure that servers and applications are patched
[D] eliminating all unneeded programs
Text 4
A writer said yesterday that Richard M. Scrushy, the former chief executive of HealthSouth, paid her through a public relations firm to produce several favorable articles for an Alabama newspaper that he reviewed before publication during his fraud trial last year.
The articles appeared in The Birmingham Times, a black-owned weekly in Birmingham, Ala. Mr. Scrushy was acquitted in June in a six-month trial there on all 36 counts against him, despite testimony from former HealthSouth executives who said he presided over a huge accounting fraud. "I sat in that courtroom for six months, and I did every thing possible to advocate for his cause," Audrey Lewis, the author of the articles, said in a telephone interview. She said she received $10,000 from Mr. Scrushy through the Lewis Group, a public relations firm, and another $1,000 to help buy a computer. "Scrushy promised me a lot more than what I got," she said.
Charles A. Russell, a spokesman for Mr. Scrushy, said he was not aware of an explicit agreement for the Lewis Group to pay Ms. Lewis. The payments to Ms. Lewis were first reported by The Associated Press yesterday. "There's nothing there I think Richard would have any part of," Mr. Russell said.
Mr. Russell said that Mr. Scrushy reviewed the articles before they were published. "Richard thought she was doing a little, 'F.Y.I., here's what I'm writing,' " Mr. Russell said. Ms. Lewis said that Mr. Russell, a prominent Denver-based crisis communications consultant, was also involved in providing her with financial compensation. She said Mr. Russell wrote her a $2,500 personal check at the end of May 2005; Mr. Russell said that was true. "She was looking for freelance community-relations work after the trial," Mr. Russell said.
Ms. Lewis came into Mr. Scrushy's sphere through Believers Temple Church; she attends services and works as an administrator there. She and Rev. Herman Henderson, the pastor, were part of a group that appeared in court with Mr. Scrushy and often prayed with him during breaks. Before and during the trial, in which 11 of the 18 jurors were black, Mr. Scrushy, who is white, forged ties with Birmingham's African-American population. He joined a predominantly black church, and his foundation donated to it and other black congregations.
Mr. Henderson also said he received payments from Mr. Scrushy in exchange for building support for him among blacks. Mr. Scrushy said in a statement yesterday that his foundation donated money to Mr. Henderson's church, but said the payments were unrelated to his case. "My foundation donated to his church building fund and to a Katrina relief effort that his church sponsored," Mr. Scrushy said. "That's it. Period."
Ms. Lewis, 31, said she was disclosing details about the financial arrangement because Mr. Scrushy still owes her and Mr. Henderson a significant amount of money. Ms. Lewis provided copies of a retainer agreement that Mr. Scrushy signed last April with the Lewis Group, a public relations firm controlled by Jesse J. Lewis Sr., 82 the founder of The Birmingham Times, and a check issued to her in May from the Lewis Group. (Ms Lewis and Mr. Lewis are not related.)
36. The word "acquitted" (Line 2, Para. 2) probably means ________.
A. discharged
B. arrested
C. quitted
D. punished
37. Mr. Russell said Richard had nothing to do with the agreement mentioned because ________.
A. Richard didn't want to pay money he owed Ms. Lewis
B. this may affect the trial
C. this may ruin Richard's reputation
D. he knew that was the fact
38. Mr. Scrushy made donations to the black groups probably because ________.
A. he had close relations with Birmingham's African-American population
B. he wanted the church to set up more buildings
C. he was very benevolent
D. he wanted to get support from the blacks in his trial
39. The last paragraph implies that ________.
A. Mr. Scrushy told a lie
B. Ms. Lewis will get the money Mr. Scrushy owes her
C. the Lewis Group may be a go-between
D. Mr. Scrushy will be involved in the trial again
40. From the text we can conclude that the author ________.
A. is supportive of Mr. Scrushy
B. favors Ms. Lewis's side
C. takes a detached attitude
D. is sympathetic
· | 2022考研复试联系导师有哪些注意事 | 04-28 |
· | 2022考研复试面试常见问题 | 04-28 |
· | 2022年考研复试面试回答提问方法有 | 04-28 |
· | 2022考研复试怎么缓解缓解焦虑心态 | 04-27 |
· | 2022年考研复试的诀窍介绍 | 04-27 |
· | 2022年考研复试英语如何准备 | 04-26 |
· | 2022年考研复试英语口语常见句式 | 04-26 |
· | 2022年考研复试的四个细节 | 04-26 |
· | 2022考研复试准备:与导师及时交流 | 04-26 |
· | 2022考研复试面试的综合技巧 | 04-26 |