VIII. Insert the proper words (see the words below)
VIII. Insert prepositions | XI. Give English equivalents | XI. Say in one word (see the words below) | X. Give English equivalents | I. Read and translate the information using the vocabulary | VII. Insert the proper words (see the words below) | X. Give English equivalents | IX. Say in one word (see the words below) | X. Give English equivalents | VIII. Give English equivalents |
- The purpose of having a logon process is to … who you are.
- Once the operating system knows who you are, it can grant or … requests for system resources appropriately.
- If a bad guy learns your password, he can … on as you.
- Or maybe he just wants to do something malicious and … it on you.
- Don’t use your dog’s name, your … date, or the name of the local football team.
- Pick a password that has a mix of upper- and … letters, number, punctuation marks, and so forth.
- Don’t tell anyone what your … is.
- Windows 2000, for instance, supports the use of … cards.
- You may also want to consider biometric products like fingerprint and … scanners.
- A computer is only as secure as the administrator is …
- This puts the administrator in a position of … power.
- An untrustworthy administrator can … virtually any protective measure in the operating system, because he controls it.
- When … a system administrator, recognize the position of trust that administrators occupy, and only hire people who warrant that trust.
- Require that your administrators pass a complete … check at hiring time.
- Whatever criteria you select, … them across the board.
- Don’t give anyone administrative privileges on your network unless they’ve been …
- Use sign-in/sign-out sheets to … who’s been in the server room.
- Finally, consider taking steps to make it more difficult for a … administrator to cover his tracks.
- anniversary
- apply
- background
- blame
- deny
- establish
- hiring
- log
- lowercase
- password
- retina
- rogue
- smart
- subvert
- track
- trustworthy
- unequalled
- vetted
IX. Say in one word (see the words below)
- registration and entrance into system
- intending to damage equipment, people or their reputation
- the date on which an event took place or something was founded in previous years
- capital letters as opposed to small letters
- a plastic card with a built-in microprocessor, used typically to perform financial transactions
- make ineffective and useless
- not genuine, true or real
- invite people to work for a company
- recommendation from a person’s previous employer
- all information about a person including his previous work record
- inspect and research something or somebody very carefully
- improve and make more efficient and modern
- a dishonest or unprincipled man who behaves in a criminal way
- a special right or advantage that only one person or a group has
- a person who always tells the truth and does not try to break the law
- anniversary
- background
- bogus
- hire
- honest
- logon
- malicious
- negate
- privilege
- references
- rogue
- smart card
- upgrade
- uppercase
- vet
Дата добавления: 2015-11-14; просмотров: 46 | Нарушение авторских прав
mybiblioteka.su - 2015-2024 год. (0.006 сек.)