单选题 Most computer systems are 17 to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be 18 to an outsider attack by preventing 19 from outside can still be vulnerable to the insider attacks accomplished by abusive usage of 20 users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually 21 by tools referred to as Intrusion Detection Systems.
【正确答案】 A
【答案解析】
【正确答案】 B
【答案解析】
【正确答案】 B
【答案解析】
【正确答案】 C
【答案解析】
【正确答案】 D
【答案解析】