清华大学-香港中文大学
2008年合作招收金融财务MBA入学试题
(笔试部分)
注意事项
1.本试卷包括英语、逻辑和数学,分别占50%、30%和20%,总分为100分;
2.答题时请将答案写在答题纸上,每个题只有唯一正确答案;
3.将本试题、答题纸及草稿纸全部留下,考试结束后将被统一收回。
姓名: 考号
身份证号:
一、英语部分(50%)
PART I Structure and Vocabulary (25×1%=25%)
Directions: There are 25 incomplete sentences in this part. For each sentence there are four choices marked A, B, C and D. Choose the ONE answer that best completes the sentence. Then blacken the corresponding letter on the Answer Sheet with a pencil.
The rats _____bacterial infections of the blood.
develop B. produce C. stimulate D. induce
The first, second, and the third prizes went to Jack, Tom, and Harry_____.
equally B. differently C. similarly D. respectively
More than 85 percent of French Canada’s population speaks French as a mother tongue and _____to the Roman Catholic faith.
asceribes B. subsceibes C. adheres D. caters
When the work is well done, a _____of accident free operations is established where time lost due to injuries is kept at a minimum.
regulation B. climate C. circumstance D. requirement
In order to prevent stress from being set up in the metal, expansion joins are fitted which _____the stress by allowing the pipe to expand or contract freely.
reclaim B. reconcile C. rectify D. relieve
Dozens of scientific groups all over the world have been _____the goal of a practical and economic way to use sunlight to split water molecules.
pursuing B. chasing C. reaching D. winning
When traveling, you are advised to take travelers’ checks, which provide a secure _____to carrying your money in cash.
substitute B. selection C. preference D. alternative
I never trusted him because I always thought of him as such a _____character.
Gracious B. suspicious C. unique D. particular
For example, it has long been known that total sleep _____is 100 percent fatal to rats.
reduction B. destruction C. deprivation D. restriction
Many old people in the cities find themselves unable to get used to the rapid _____of city life.
rate B. speed C. step D. pace
The captain of the ship _____the passengers that there was no danger.
A. assured B. ensured C. secured D. insured
The speaker who does not have specific words in his working vocabulary may be unable to explain or describe in a _____that can be understood by his listeners.
case B. means C. method D. way
Industrial safety does not just happen. Companies with low accident rates plan their safety programs, work hard to organize them, and continue working to keep them _____and active.
Alive B. vivid C. mobile D. diverse
The key to the industrialization of space is the U.S. space shuttle. With it, astronauts will acquire a workhorse vehicle _____of flying into space and returning many times.
capable B. suitable C. efficient D. fit
The discussion was so prolonged and exhausting that _____the speakers stopped for refreshments.
at large B. at intervals C. at ease D. at random
In no country _____Britain, it has been said, can one experience four seasons in the course of a single day.
other than B. more than C. better than D. rather than
So little _____ about physics that the lecture was completely beyond me.
A. I knew B. did I know C. I had known D. had I known
Concerns were raised _____witnesses might be encouraged to exaggerate their stories.
A. what B. when C. which D. that
It can be ready for _____trip in about two weeks.
A. new B. another C. certain D. subsequent
To drive and _____ within the speed limits _____ necessary in today’s traffic.
A. staying/is B. to stay/are C. to stay/is D. staying/are
PART II Reading Comprehension (15×2%=30%)
Directions: There are 3 passages in this part. Each passage is followed by some questions or unfinished statements. For each of them here are four choices marked A, B, C and D. You should decide on the best choice and blacken the corresponding letter on the Answer Sheet with a pencil.
Questions 21 to 25 are based on the following passage:
While hackers with motives make headlines, they represent less than 20% of all network security breaches. More common are instances of authorized users accidentally winding up where they should not be and inadvertently deleting or changing data. However, the Internet introduces another concern: some Internet surfers are bound to go where they have no business and, in so dong, threaten to wipe out data to which they should not have access.
Before picking a firewall, companies need to adopt security policies. A security policy states who or what is allowed to connect to whom or what. You can group all users by department or classification. The better firewall products let you drag and drop groups in a graphical user interface (GUI) environment to define network security easily.
Two methods are most often used together to establish an Internet firewall. They are application and circuit gateways, as well as packet filtering. With application and circuit gateways, all packets are addressed to a user-level application on a gate-way that relays packets between two points. With most application gateways, additional packet-filter machines are required to control and screen traffic between the gateway and the networks. A typical configuration includes two routers with a bastion host that serves as the application gateway sitting between them.
A drawback to application and circuit gateways is that they slow network performance. This is because each packet must be copied and processed at least twice by all the communication layers. Packet-filter gateways, which act as routers between two nets, are less secure than application gateways but more efficient. They are transparent to many protocols and applications, and they require no changes in client applications, no specific application management or installation, and no extra hardware.
Using a single, unified packet-filter engine, all net traffic is processed and then forwarded or blocked from a single point of control. However, most packet filters are stateless, understand only low-level protocols, and are difficult to configure and verity. In addition, they lack audit mechanisms. Some packet filters are implemented inside routers, limiting computing power and filtering capabilities. Others are implemented as software packages that filter the packets in application-layer processes, an inefficient approach that requires multiple data copies, expensive delays and context switches and delivers lower throughput.
So what’s a network administrator to do? Some vendors are developing firewalls that overcome many of these problems and combine the advantages of application gateways and packet filtering. These efficient, protocol-independent, secure firewall engines are capable of application-level security, user authentication, unified support, and handling of all protocols, auditing and altering. They are transparent to users and to system setup, and include a GUI for simple and flexible system management and configuration.
The most suitable title for this passage is _____.
A. Hackers and Our Defense
B. Internet Surfer’s Guide
C. Firewall: A Measure of Network Security
D. Information Technology
According to what you have read, the author’s probable preference will be_____.
A. walling for the coming of better firewall products.
B. finding a combination of both application gateway and packet filtering approach
C. meeting demands of every type with better products
D. implementing one better approach in the adoption of a firewall solution
In choosing a firewall product, what is implied as the main concern of the author?
A. Management B. Transparency
C. Independence D. Efficiency
Which of the following can be inferred from the passage concerning the networks using application and circuit gateways?
A. Secure and speedy B. Secure but slow
C. Insecure and slow D. Insecure but speedy
For whom is this passage most likely written:
A. Government officials B. Hackers
C. Network administrators D. Computer experts.
Questions 26 to 30 are based on the following passage:
Internet is a global network that connects other computer networks, together with software and protocols for controlling the movement of data. The Internet, often referred to as“the Net”, was initiated in 1969 by a group of universities and private research groups funded by the U.S. Department of Defense. It now covers almost every country in the world. Its organization is informal and deliberately nonpolitical, and its controllers tend to concentrate on technical aspects rather than on administrative control.
The Internet offers users number of basic services including data transfer, electronics mail, and the ability to access information in remote to exchange information and debate specific subjects of interest. In addition, there are a number of high-level services. For example, MBONE allows the transmission of messages to more than one destination. It is used in video conferencing. The World Wide Web, known as“the Web”,is another high level Internet service, developed in the 1990s in Geneva. It is a service for distributing multimedia information, including graphics, pictures, sounds, and video as well as text. A feature of the World Wide Web is th