a我考网

 找回密码
 立即注册

QQ登录

只需一步,快速开始

扫一扫,访问微社区

查看: 76|回复: 0

[四级模拟] 2011年英语四级考试模拟练习题及答案(6)

[复制链接]
发表于 2012-8-14 09:52:33 | 显示全部楼层 |阅读模式
  Passage Two
- m# g1 X- O1 Y+ X9 x( _$ d" m- u. n  Questions 57 to 61 are based on the following passage.
: `8 p" T5 l# M0 K& E" v+ G) G  InfraGard is a grass-roots effort to respond to the need for cooperation and collaboration in countering the threat of cyber crime and terrorism to private businesses and the government. By the end of September, there will be InfraGard chapters in all 50 states, Calloway said. With advice from the FBI, each local chapter will be run by a board of directors that includes members of private industry, the academic community and public agencies. Bands, utilities, and other businesses and government agencies will use a secure Web site to share information about attempts to hack into their computer networks. Members can join the system free. A key feature of the system is a two-pronged method of reporting attacks.
* ]; g% m. Q3 @7 J6 b- E) l8 T  A "sanitized" description of a hacking attempt or other incident-one that doesn't reveal the name or information about the victim-can be shared with the other members to spot trends. Then a more detailed description also can be sent to the FBI's computer crimes unit to interfere if there are grounds for an investigation. Cyber crime has jumped in recent years across the nation, particularly in hotbeds of financial commerce and technology like Charlotte. "Ten years ago, all you needed to protect yourself was a safe, a fence and security officers," said Chris Swecker, who is in charge of the FBI's Charlotte office. "Now any business with a modem is subject to attack." FBI agents investigate computer hacking that disrupted popular Web sites including Amazon. com, CNN and Yahoo!
6 o- v' z. N6 A5 B6 _, _' n  several North Carolina victims have been identified this year. The investigation has also identified computer systems in North Carolina used by hackers to commit such attacks. Prosecutions of hackers have been hampered by the reluctance of companies to report security intrusions for fear of bad publicity and lost business. Meanwhile, too many corporations have made it too easy for criminals by sacrificing security for speed and accessibility. Jack Wiles, who will lead the local InfraGard chapter's board, said a recent report estimated 97 percent of all cyber crime goes undetected. Wiles, a computer security expert, has a firewall on his personal computer to prevent hackers from getting into his files. "I get at least one report a day that somebody was trying to get into my computer," he said, "the Net is a wonderful place, but it's also a dangerous one."
* q3 l9 }, c4 B7 i& I, p. k  57. From the first paragraph, we know ________.# V% K% T& m7 K; |
  [A] InfraGard is a protective measure against cyber crime( N4 L2 t& }/ g
  [B] InfraGard is a measure of cooperation and collaboration$ z2 {5 d* r9 b% `6 \
  [C] there will be 50 InfraGard chapters in all states3 X: B. H2 O( H$ b- U& p) l
  [D] private business and the government are now committing cyber crime+ Q. }* J0 @  y; I: W' y: |# j2 y" v
  58. Each local chapter of InfraGard will be run by the following EXCEPT ________.
6 X9 q: B8 x. Y9 s+ W  [A] academic communities
& Q) N. w$ X; ^3 n! v) k& ^# K: a$ L5 l  [B] public agencies
& k8 u' \& F' u% Z  [C] FBI9 P+ }" l6 N: D; R% A
  [D] private industry2 @1 n4 O5 T1 u5 X/ g8 _/ ^
  59. By saying "too many corporations...speed and accessibility" (Lines 3~4, Para. 3), the author means ________.
" l7 F7 K1 F+ K# ^+ F  [A] too many corporations take no notice of the security problem of computers
6 g2 r; {( T; |6 X; ^5 C  [B] criminals are sacrificing security for speed and accessibility
  o* b( ~2 V' _: J( L  [C] it's very easy to sacrifice security for speed and accessibility
# W* k$ B8 `& s# G. c  [D] many companies suffer from computer hacking because they value speed and accessibility more than security( [/ X: r( u# \! j  I
  60. All the following are reasons for the rise in cyber crime EXCEPT ________.
( K# z9 Z5 i/ O6 e5 v0 `  [A] victims won't report intrusions by hackers
, E8 v" I( J) T' B  [B] victims have no firewalls( l" @6 ^' ?* e0 ?
  [C] the use of modem is increasing& @2 y8 _, Q" N$ n/ v
  [D] companies don't pay enough attention to security7 D0 N% q  X& q+ I5 ?8 G: y' |4 @
  61. It can be concluded from the passage that ________.  B2 |( b/ Q2 n
  [A] not all hacking attempts are worthy of investigation
  ~, y2 @5 Z8 N& U6 |  [B] information of the victims is inaccessible5 L! `+ ]- V5 `4 [
  [C] InfraGard chapters will be in effect by the end of September
9 O7 B$ D0 ^/ k: v8 [  [D] Amazon.com was often disrupted by hacking
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

Archiver|手机版|小黑屋|Woexam.Com ( 湘ICP备18023104号 )

GMT+8, 2024-11-16 23:51 , Processed in 0.265473 second(s), 21 queries .

Powered by Discuz! X3.4 Licensed

© 2001-2017 Comsenz Inc.

快速回复 返回顶部 返回列表