問題詳情

五、文意選填 (10%)
(A)enormous
(B) disposal
(C) efficiently
(D)breaches
(E) burden(F) sight (G) inevitable (H) bay (I) largely (J) placed(K) victimized (L) expanded (M) cyber (N) confidential   Nowadays, everything is in the cloud. Holding everything from highly personal medicaland social media material to ___49___ financial and corporate documents, Internet‐basedcloud services are gathering a(n) ___50___ trove of information—already a quarter of theworld’s business data—that is proving a powerful lure for hackers.Some information ___51___ in the cloud can get into the wrong hands because ofequipment mishaps or employee foul‐ups. But hackers are among the biggest concerns, andmany businesses mistakenly assume their cloud providers will keep the thieves at ___52___,said JD Sherry of the security firm Trend Micro. While offering some protections, he said, theproviders often leave security ___53___ to their customers.“That ___54___ of responsibility typically falls upon the customer and that often can bea huge challenge for a lot of folks,” he said.A social media site break‐in can cause havoc, but ___55___ of corporate financial dataand trade secrets could be far more serious, and cloud‐based companies will have to becomequicker at responding to ___56___ attacks. Even so, it is predicted that more companies willbe ___57___ as they shift their data into the cloud. “It’s ___58___,” said the generalmanager at Hewlett‐Packard, “It’s going to happen.”
49

參考答案

答案:[無官方正解]
難度:適中0.5
統計:A(0),B(0),C(0),D(0),E(0)

內容推薦