
104年公務人員特種考試司法人員、法務部調查
局調查人員、國家安全局國家安全情報人員、
海岸巡防人員及移民行政人員考試試題
 
代號:53940  全一張 
(背面)
考 試 別:移民行政人員 
等    別:三等考試 
類 科 組:移民行政(選試印尼文) 
科    目:外國文(印尼文兼試移民專業英文) 
 
7 In light of the risk and potential        of cyber events, strengthening the security and resilience of cyberspace has become 
an important homeland security mission. 
conclusions  consequences  contingents  congregations 
8 Young people nowadays are good at multi-tasking. For example, they can              check their Facebook and do school 
assignments. 
competitively  comparably  concurrently  considerably 
9 In order to attract foreign talents to Taiwan and accord privileged courtesy toward foreign academic or business professionals, 
the Ministry of the Interior has              Directions for Foreign Nationals Applying for the Business and Academic Travel Card. 
proven  prolonged  propelled  promulgated 
10 Automatic ePassport gates at some airports use facial       technology to check your identity against the photo in your 
passport. 
recording  recognition  realization  recreation 
請依下文回答第 11 題至第 15 題: 
Immigration   11    around the world have used online arrival cards in place of traditional paper forms in recent years. For 
instance, the U.S. has   12   paper Form I-94 Arrival/Departure Record. Following this border   13   trend, the National 
Immigration Agency (NIA) also introduces Online Arrival Card services. Qualified users only need to   14   their arrival 
information at NIA website before arriving in Taiwan. In this way, paper Arrival Card will not be needed during the      15     process. 
11 autonomies  autographs  authorities  auctions 
12 consulted  cancelled  canopied  conducted 
13 migration  mimicry  management  mileage 
14 provide  perform  promote  permit 
15 intention  invention  intervention  inspection 
請依下文回答第 16 題至第 20 題: 
Cyberspace and its underlying   16    are vulnerable to a wide range of risk stemming from both physical and cyber 
threats and hazards. Sophisticated cyber actors and nation-states   17   vulnerabilities to steal information and money and 
are developing capabilities to disrupt, destroy, or threaten the delivery of essential services. A range of traditional crimes is 
now being   18    through c yberspace. This includes the production and   19    of child pornography and child e xploitation 
conspiracies, banking and financial  fraud, intellectual property violations, and other cri mes. All these have      20     human and 
economic impacts. 
16 influence  intention  infrastructure  intuition 
17 exploit  extend  expire  excrete 
18 presumed  pretended  prevented  perpetrated 
19 distinction  distribution  disruption  disinflation 
20 singular  stingy  substantial  sexual