首页
登录
学历类
Text 1 What has been described as the la
Text 1 What has been described as the la
最全题库
2022-08-02
21
问题
Text 1 What has been described as the largest ever ransomware attack-a cyber criminal scheme that locks up computer files until vicLims pay a ransom-holds the paradoxical disLinction of being both an outrageous success(in terms of its blast radius)as well as an abject failure(in terms of its h8ul).The malicious software spread so far and wide,jammed up so many IT networks and generated so much panic and chaos that the wronE;doers effectively undid themselves.On May 12,the world awoke to the beginnings of hundreds of thousands of old Microsoft Win-dows based computers'seizing up as Lhey subjected to a malicious software,appropriately called WannaCry.Within hours,the digital epidemic circled the globe like the Spanish flu,infecting ma-chines running outdated operating systems in some 150 countries,spreading across numerous homes and corporate networks.The attack,which relied on powerful tools believed to have been developed by the NSA and leaked online in April by a group of hackers known as the Shadow Brokers,wormed its way through businesses,hospitals and govemments,all of which found themselves suddenly locked out of their own systems.Researchers detected the wave quickly,and it wasn't long before they picked up on the criminals'self-defeating mistakes.The attackers failed to assign each victim a separate Bitcoin wallet,researchers noted,a criiical error that meant they would not be able to easily Lrack ransom pay-ments.They neglected to automate the money collection in a way that would scale.And then there was the matter of the kill switch.No one is quite certain why the attackers coded a self-destruct burton into their software,yet that's precisely what they did,Marcus Hutchins,a 22-year-old security researcher based in England who goes by MalwareTech,stumbled on the power plug largely by accident.After taking lunch on that Friday aftemoon,he inspected the malware and noticed a specific web address encoded within.Curious,he registered the domain for less than$11.This simple aci stopped the malware,killing the virus'ability to spread and buying Lime for organizations to upgrade their software and deploy protections.The most suitable title for the text is_____A.An Unsuccessful Malware AttackB.Cyber Crime:Hard to PreventC.A Widespread Computer VirusD.WannaCry:New Malicious Software
选项
A.An Unsuccessful Malware Attack
B.Cyber Crime:Hard to Prevent
C.A Widespread Computer Virus
D.WannaCry:New Malicious Software
答案
A
解析
主旨题。本题需综合各段首句。第一段首句提到ransomware attack.an abject failure等关键词;第二段首句提到malicious software,WannaCry等关键词;第三段首句出现the criminals'self defeating mistakes这一关键词;第四段首句出现the attackers,self-destruct but-ton等关键词。文章讨论WannaCr恶意软件攻击,从首段就指出它既是一次成功,也是一次失败,尤其第三、四段着重讨论该软件的缺陷,其中abject failure,self-defeating mistakes,self-destruct都是明显提示。故[A]与原文主旨最接近,其中unsuccessful=failure.self-de-feating mistakes.self-destruct等词。选项[B]cyber crime强调“网络犯罪”,而非“恶意软件”,故排除。选项[C]computer virus强调“电脑病毒”,[D]malicious software强调“恶意软件”,但都没体现failure这一关键词,故排除。综上.[A]为本题答案。
转载请注明原文地址:https://tihaiku.com/xueli/2700405.html
本试题收录于:
英语二研究生题库研究生入学分类
英语二研究生
研究生入学
相关试题推荐
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
随机试题
Itwasnot______1982thathewentbacktoAmerica.A、sinceB、untilC、beforeD、aft
SimilaritiesandDifferencesbetweenPublicSpeakingandConversationI.
Shoppinghasbecomeaverysecretandmysteriousaffair.Conspicuousconsump
城市供电工程详细规划中的主要内容包括()。A.对详细规划区中各类建筑进行负
我国劳动者的标准工作日为每日工作()小时,每周工作()小时。A.7,40
下列反向大豆提油套利的做法,正确的是()。A.买入大豆期货合约,同时卖出豆
某药材自顶端开裂或裂成两瓣,表面黄棕色或红棕色,内表面多为浅黄棕色,平滑,具一纵
环境污染治理的废水三级处理法中,一级处理是采用物理和化学方法,去除废水中( )
关于施工阶段特点的说法,错误的是()。A、施工阶段是影响建设工程投资的关键阶段
关于建筑安装工程费用中税金的说法中,正确的是()。A:税金是指按国家税法规定应计
最新回复
(
0
)