首页
登录
学历类
Text 1 What has been described as the la
Text 1 What has been described as the la
最全题库
2022-08-02
39
问题
Text 1 What has been described as the largest ever ransomware attack-a cyber criminal scheme that locks up computer files until vicLims pay a ransom-holds the paradoxical disLinction of being both an outrageous success(in terms of its blast radius)as well as an abject failure(in terms of its h8ul).The malicious software spread so far and wide,jammed up so many IT networks and generated so much panic and chaos that the wronE;doers effectively undid themselves.On May 12,the world awoke to the beginnings of hundreds of thousands of old Microsoft Win-dows based computers'seizing up as Lhey subjected to a malicious software,appropriately called WannaCry.Within hours,the digital epidemic circled the globe like the Spanish flu,infecting ma-chines running outdated operating systems in some 150 countries,spreading across numerous homes and corporate networks.The attack,which relied on powerful tools believed to have been developed by the NSA and leaked online in April by a group of hackers known as the Shadow Brokers,wormed its way through businesses,hospitals and govemments,all of which found themselves suddenly locked out of their own systems.Researchers detected the wave quickly,and it wasn't long before they picked up on the criminals'self-defeating mistakes.The attackers failed to assign each victim a separate Bitcoin wallet,researchers noted,a criiical error that meant they would not be able to easily Lrack ransom pay-ments.They neglected to automate the money collection in a way that would scale.And then there was the matter of the kill switch.No one is quite certain why the attackers coded a self-destruct burton into their software,yet that's precisely what they did,Marcus Hutchins,a 22-year-old security researcher based in England who goes by MalwareTech,stumbled on the power plug largely by accident.After taking lunch on that Friday aftemoon,he inspected the malware and noticed a specific web address encoded within.Curious,he registered the domain for less than$11.This simple aci stopped the malware,killing the virus'ability to spread and buying Lime for organizations to upgrade their software and deploy protections.The most suitable title for the text is_____A.An Unsuccessful Malware AttackB.Cyber Crime:Hard to PreventC.A Widespread Computer VirusD.WannaCry:New Malicious Software
选项
A.An Unsuccessful Malware Attack
B.Cyber Crime:Hard to Prevent
C.A Widespread Computer Virus
D.WannaCry:New Malicious Software
答案
A
解析
主旨题。本题需综合各段首句。第一段首句提到ransomware attack.an abject failure等关键词;第二段首句提到malicious software,WannaCry等关键词;第三段首句出现the criminals'self defeating mistakes这一关键词;第四段首句出现the attackers,self-destruct but-ton等关键词。文章讨论WannaCr恶意软件攻击,从首段就指出它既是一次成功,也是一次失败,尤其第三、四段着重讨论该软件的缺陷,其中abject failure,self-defeating mistakes,self-destruct都是明显提示。故[A]与原文主旨最接近,其中unsuccessful=failure.self-de-feating mistakes.self-destruct等词。选项[B]cyber crime强调“网络犯罪”,而非“恶意软件”,故排除。选项[C]computer virus强调“电脑病毒”,[D]malicious software强调“恶意软件”,但都没体现failure这一关键词,故排除。综上.[A]为本题答案。
转载请注明原文地址:https://tihaiku.com/xueli/2700405.html
本试题收录于:
英语二研究生题库研究生入学分类
英语二研究生
研究生入学
相关试题推荐
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
随机试题
InBritainandothercountries,youngpeoplesometimestakea"gapyear",a
A.Na B.葡萄糖 C.白蛋白 D.纤维蛋白 E.清蛋白血浆胶体渗透压
隧道监控量测中获取的位移数据通过分析处理,可用于围岩稳定和支护效果的判断判断所依
乳牙期矫治的适应证是A.严重拥挤 B.散在间隙 C.前牙反 D.轻度深覆
基金管理人是( )机构。A.自行募集 B.间接募集 C.委托募集 D.公
发现疑似继电保护和安全自动装置家族性缺陷,按《国家电网公司继电保护和 安全自动
世界银行在进行投融资服务采购时,经常采用固定价格招标方式,其主要原因是()。A.
王某将朋友李某和张某打伤,李某以王某为被告向法院提起诉讼。在法院受理该案时,张某
甲地到乙地,步行比骑车速度慢75%,骑车比公交慢50%,如果一个人坐公交从甲地到
以下是某求助者的WAIS-RC的测验结果: 本案例中求助者测验成绩高于
最新回复
(
0
)