题目内容:
According toParagraph 2, some organizations check their systems to find out
A.whether there is any weak point.
B.what sort of data has beenstolen.
C.who is responsible for the leakage.
D.how thepotential spies can be located.
参考答案:
According toParagraph 2, some organizations check their systems to find out
A.whether there is any weak point.
B.what sort of data has beenstolen.
C.who is responsible for the leakage.
D.how thepotential spies can be located.