Fill in the numbered spaces with the words or phrases chosen from the box. Change the forms where necessary.Symantec—Computer Security Solutions LeaderSymantec’s programmers1 _every lie of code, rewrote programs, and 2 a new security model tocreate itslatest3 of Norton AntiVirus and Norton Internet Security. The results are programs that useless hard disk pace, decrease starting and scanning time, and __4less than 7 MB of memory.The more than 100 performance improvementsoffer5 protection formillions of computer users6 .TheCalifornia-based companyis one of the ten largest software corporations in the world. It was founded in 1982 and has7in more than 40 countries. Its primary manufacturing facilityis8 in Dublin, Ireland.Symantecrecently9the latestversion of its Norton Internet Security software. A ratingservice tested he level of protection10by 10 different security products and gave Norton Internet Security the only perfect score.
查看答案
Translate the following passage into ChineseGene Spafford—Computer Security ExpertThe Morris Worm, also called the MBDF virus, is considered the first computer worm distributed on the Internet, and Gene Spafford gained fame for deconstructing and analyzing this 1988 attack. His work led to the conviction of a Cornell University student, Robert Morris. Today, Spfford, who also is known as Spaf, is recognized as one of the world’s foremost experts in the computer security, intelligence, cybercrime and software engineering fields.For 30 years, he has advised major corporations, including Microsoft, Intel, and Unisys, the U.S, Air Force, the Federal Bureau of Investigation, and two U.S. presidents. He is noted for several firsts in the computer security field. For example, he defined the terms, software forensics and firewall, wrote the first English-language book on the topics of viruses and malware, and founded the world's first multidisciplinary academic security awareness group: the Center for Education and Research in Information Assurance and Security (CERIAS).
Man-in-the-middle attack is network-based security problem.
A. 对
B. 错
A denial of service attack directly corrupts data or gives inappropriate access.
A. 对
B. 错
Phishing is an attack that allows one user to masquerade as another.
A. 对
B. 错