Tiếng AnhTừ đề thi

Read the following passage and mark the letter A, B, C or D on your answer sheet to indicate the option that best fits each of the numbered...

Đề bài

Read the following passage and mark the letter A, B, C or D on your answer sheet to indicate the option that best fits each of the numbered blanks from 36 to 40.

The contemporary digital landscape has evolved into a perilous environment where the proliferation of remote work has exponentially expanded the attack surface. This exposure, compounded by a reliance on legacy systems that lack agility, subjects organizations to sophisticated cyber threats, (36) ______, necessitating a fundamental overhaul of defense mechanisms away from traditional perimeter-based models.

While robust encryption creates a formidable barrier against unauthorized intrusion, it remains a pervasive reality that employees lacking vigilance, even when provided with comprehensive policy guidelines regarding data privacy, (37) ______, thereby rendering technical defenses futile against social engineering. This human vulnerability underscores why security cannot be purely technological. (38) ______. Consequently, organizations must pivot towards a holistic strategy that integrates psychological resilience with technical fortification.

However, convincing stakeholders to allocate funds remains difficult, as returns are rarely immediate. (39) ______. Without this prioritization, companies risk not only monetary loss but irrevocable reputational damage. In a marketplace where consumer confidence is fragile, mere compliance is insufficient; rather, in an era defined by skepticism, (40) ______, a distinction that elevates resilient enterprises above negligent ones.

(Adapted from ResearchGate)

Question 36:

A. some of them are inherently specific targets of vulnerabilities in cloud computing environments

B. while they specifically target inherent cloud computing environments in vulnerabilities

C. many of which target specific vulnerabilities inherent in cloud computing environments

D. and targeting the environmental vulnerabilities specific to inherent cloud computing

Xem đáp án và lời giải

Câu hỏi liên quan