阅读理解
During the last three years, many speculated high about the possible intrusions concerning the corporate computing systems and global computing ''infrastructure. Fortunately, such and many other frightening predictions did not come true. Surely, technology is the prime reason for this achievement but at the core lies the work environment and the human factor.
We have seen that IT leaders in almost all areas have enormously reduced their expenses by adopting winning solutions provided by today''s security vendors. Does this mean technology a lone is sufficient to deliver? No, in the truest sense, policies, their enforcement, along with education and training provide a winning combination to secure corporate computing.
As far as technology is concerned, due credit goes to security vendors and service providers for shielding users in many ways, from desktop antivirus software to integrated security appliances. Also, myths about the role played by operating systems in security have finally died out. Almost all OS(计算机操作系统)vendors(供应商) such as Microsoft, IBM, Sun, Red Hat, etc. have earned trust and recognition with their installed systems, suggesting that security is not a feature of an operating system.
The recently conducted 2003 Info World Security Survey of more than 500 IT executives and strategists reveals that around 49 percent of reader respondents felt confidence in their systems-performance with 52 percent observing fewer than 100 attempts against their, networks in the past year. This highlights the role of policies, enforcement, and positive culture in shielding away security breaches. In today''s IT culture, playing a black-hat is no longer desirable; rather it leads to quick apprehension and strict punishment with years to be spent behind the bars. Alternatively, one can earn both career and recognition by helping out the industry with ways and means of fighting security breaches and hostile attacks -- this way of looking into the matter is rapidly gaining support by many.
Training is another important concern for IT leaders-it includes training to avert human error and improve overall security practices. Unfortunately, a large part, 79 percent, of InfoWorld 2003 Security Survey respondents felt their corporation employees and users underestimated the importance of adhering to their company''s security policies. It''s critical not to underestimate the role of sound security practices since employees and users shape the needs for enterprise services.
Two other elements must also be kept in consideration: rigorous education and awareness of security requirements and significant number of staff to monitor and enforce security practices in the enterprise, the need for which is stronger than ever since many enterprises today handle security internally. All this underscores greater demand for training and education for security related workers.
单选题
Which of the following elements is the most critical to online security according to the author?
【正确答案】
A
【答案解析】推理判断题。文章第一段最后一句话说technology is the prime reason for this achievement but at the core lies the work environment and the human factor。题干中的the most critical与原文的at the core相照应,四个选项中能概括the work environment and the human factor的是[A]。其他三项都不是最重要的因素。
单选题
An operating system is no guarantee of online security probably because ______.
【正确答案】
B
【答案解析】推理判断题。原文第三段第一句说As far as technology is concerned,due credit goes to security vendors and service providers for shielding users in many ways…,接着说myths about the role played by operating systems in security have finally died out,因此操作系统不能保证网络安全是因为它不能保护用户不受侵犯。[A]项是说OS供应商不值得信赖,而根据第三段最后一句可知,原文是说OS供应商在系统方面还是赢得了信赖的,只不过他们认为安全性不是操作系统的一项特征,因此[A]项错误;[C]项和[D]项与原文不符。
单选题
The 2003 survey reveals that ______.
【正确答案】
C
【答案解析】事实细节题。原文第五段第二句提到,2003 Security Survey显示很多企业都认为其员工低估了遵守公司安全政策的重要性,旨在说明对员工进行培训对于网络安全十分重要。而且,第二段中说in the truest sense,policies,their enforcement,along with education and training provide a winning combination to secure corporate computing,这说明单单依靠技术不能保证网络安全。[C]项是对此的抽象概述。
单选题
It is important that employees stick to their company''s security policies because ______.
【正确答案】
A
【答案解析】事实,细节题。原文倒数第二段最后一句说It''s critical not to underestimate the role of sound security practices since employees and users shape the needs for enterprise services。“shape the needs…”指形成了对公司网络服务的需要,即员工是网络的终端使用者,因此答案选[A]。
单选题
The word "underscore" in the last sentence of the text probably means"______".
【正确答案】
C
【答案解析】语义理解题。原文最后一句说All this underscores greater demand for training and education for security-related workers,结合前文可以判断对和网络安全相关的员工的训练和教育应该加强,因此答案选 [C]。underscore本意指“在…下划线”,引申为“强调”之意。