37.According to Paragraph 2, some organizations check their systems to find out
(A) whether there is any weak point.
(B) what sort of data has been stolen.
(C) who is responsible for the leakage.
(D) how the potential spies can be located.
答案:登入後查看
統計: 尚無統計資料
統計: 尚無統計資料