专业英语四级-112及答案解析.doc
《专业英语四级-112及答案解析.doc》由会员分享,可在线阅读,更多相关《专业英语四级-112及答案解析.doc(16页珍藏版)》请在麦多课文档分享上搜索。
1、专业英语四级-112及答案解析 (总分:100.00,做题时间:90分钟)二、Passage 1(总题数:1,分数:20.00)They may be just passing your office, computer bag slung over one shoulder. Or they may be sitting in a car outside it, casually tapping away at a laptop. They look like innocent passers-by. In fact, they are stealing your corporate sec
2、rets. Drive-by hacking is the trendy term given to the practice of breaking into wire-less computer networks from outside the buildings that house them. A recent study in the UK, sponsored by RSA Data Security, found that two-thirds of organizations with wireless networks were risking their data in
3、this way. Security experts patrolled several streets in the City of London seeking evidence of wireless networks in operation. Of 124 that they identified, 83 were sending data without encrypting them. Such data could readily be picked up by a passer-by armed only with a portable, computer, a wirele
4、ss modem and a few pieces of soft-ware that can be freely downloaded from the Internet. The data could include sensitive company documents containing valuable information. Or they could be e-mail identities and passwords that could be used by hackers to log into corporate networks as if they were le
5、gitimate users. Most companies using wireless networking technology do not take even the simplest of precautions to protect their data. Nearly all wireless network technology comes with some basic security features that need only to be activated in order to give a minimum level of security, for exam
6、ple, by encrypting the data being passed over the network. Raymond Kruck, business development manager at Check Point Software, a security technology specialist, believes this could be partly a psychological problem. People see the solid walls of their building as bulwarks and forget that wireless n
7、etworks can extend up to 200 meters beyond physical walls. Companies without any security at all on their wireless networks make it risibly easy for hackers to break in. Switching on the security that comes with the network technology should be automatic. Then there are other basic Steps a company c
8、an take, says Mr. Kruck, such as changing the passwords on the network from the default setting. Companies can also install firewalls, which form a barrier between the internal network and the public Internet. They should also check their computer records regularly to spot any abnormal activity, whi
9、ch might betray the presence of a hacker.(分数:20.00)(1).According to the study sponsored by RSA Data Security, two thirds of the subjects _.(分数:4.00)A.had their corporate data stolen.B.depended on wireless computer networks.C.were exposed to drive-by hacking.D.were unaware of the risk of wireless hac
10、king.(2).Which of the following is not considered in the study?(分数:4.00)A.The number of wireless hacking incidents.B.The number of wireless computer networks.C.The way in which data are sent and received.D.The way in which data are hacked and stolen.(3).Most wireless network technology comprises _.(
11、分数:4.00)A.date encryption programsB.password security programsC.illegitimate-user detectionD.virus-intrusion detection(4).Raymond Kruck most probably agrees that wireless network security involves _.(分数:4.00)A.wireless signal administrationB.changes in users awarenessC.users psychological healthD.st
12、ronger physical walls(5).Without firewalls, companies using wireless networks _.(分数:4.00)A.cannot operate normallyB.should turn to passwordsC.will be easily attacked by hackersD.can still spot the activities of hackers三、Passage 2(总题数:1,分数:20.00)Naturally, in a group of animals as diverse as the snak
13、es, and with so many varied enemies, there are numerous defensive reactions and devices. There is, however, one general pattern of behavior. In the presence of suspected enemy the first reaction is to try to escape observation; if this fails, the next resort is the flight to some inaccessible retrea
14、t, but if this is not possible, or is circumvented, various kinds of intimidatory gestures and warning devices are brought into play; in the last resort the snake attacks. This pattern varies with the circumstances; some stages may be omitted or combined unpredictably whilst; some notoriously irasci
15、ble species may dispense with all the preliminaries and attack almost at once, though seldom or never without some provocation. Amongst the factors that increase aggressiveness are hunger, the mating season and surprise, with the last mentioned the commonest; when hunting for food or for mate, activ
16、ity and the aggressive instinct are both at their peak. Owing to their poor sense of hearing snakes are very liable to be, quite literally, caught napping and a similar situation arises during their periods of temporary blindness just before sloughing (蜕皮) begins. By far the greatest number of snake
17、-bit accidents result from the unwitting disturbance of resting snakes, and this hazard is much increased with species that are well disguised and whose natural instinct is to trust to this concealment as their principal defense. As well as differences in aggressiveness between individuals of the sa
18、me species according to the circumstances and conditions, there are also no-table differences between species, even closely allied species ; and the reports of those who have been at-tacked may understandably be lacking in objectivity. So it is impossible to forecast, even in outline, how any encoun
19、ter will develop. The Hamadryad, for example, is usually credited with being amongst the most aggressive of snakes, and there are many accounts of unprovoked attacks, yet on one occasion fourteen men and seven dogs passed and returned within two yards from a nest and no snake was seen although the f
20、emale, which guards the nest, could not have been far away.(分数:20.00)(1).When a snake meets a potential enemy, its primary device is _.(分数:4.00)A.avoiding any observationB.finding a safe shelterC.giving a warning threatD.starting a quick attack(2).By dispense with all the preliminaries (Para. 1), th
21、e author most probably means that _.(分数:4.00)A.the snakes combine all the previous three stepsB.the snakes give up all the previous three stepsC.the snakes follow all the previous steps one by oneD.the snakes reverse the order of all the previous steps(3).A snake is most aggressive when _.(分数:4.00)A
22、.it meets a possible enemyB.it is caught when it is sleeping or sloughingC.it is disturbed unknowinglyD.it seeks a partner in the mating season(4).It is difficult to predict what would happen when a snake meets a man because _.(分数:4.00)A.no one has ever clearly known how he himself was bitB.man tend
23、s to be subjective when he describes his encounter with a snakeC.the aggressiveness of the snakes diversify according to different situationsD.a snake does not begin to attack without provocation(5).The author uses the example in the last paragraph to support his idea that _.(分数:4.00)A.snakes do not
24、 begin the aggressive act if it is not disturbedB.some snakes are more aggressive and more ready to attackC.it is hard to forecast whether and how snakes would attackD.snakes often conceal themselves as their principal defense四、Passage 3(总题数:1,分数:20.00)Spanning the ocean divide between the U.S. and
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 专业 英语四 112 答案 解析
