首页
登录
学历类
Text 1 What has been described as the la
Text 1 What has been described as the la
最全题库
2022-08-02
14
问题
Text 1 What has been described as the largest ever ransomware attack-a cyber criminal scheme that locks up computer files until vicLims pay a ransom-holds the paradoxical disLinction of being both an outrageous success(in terms of its blast radius)as well as an abject failure(in terms of its h8ul).The malicious software spread so far and wide,jammed up so many IT networks and generated so much panic and chaos that the wronE;doers effectively undid themselves.On May 12,the world awoke to the beginnings of hundreds of thousands of old Microsoft Win-dows based computers'seizing up as Lhey subjected to a malicious software,appropriately called WannaCry.Within hours,the digital epidemic circled the globe like the Spanish flu,infecting ma-chines running outdated operating systems in some 150 countries,spreading across numerous homes and corporate networks.The attack,which relied on powerful tools believed to have been developed by the NSA and leaked online in April by a group of hackers known as the Shadow Brokers,wormed its way through businesses,hospitals and govemments,all of which found themselves suddenly locked out of their own systems.Researchers detected the wave quickly,and it wasn't long before they picked up on the criminals'self-defeating mistakes.The attackers failed to assign each victim a separate Bitcoin wallet,researchers noted,a criiical error that meant they would not be able to easily Lrack ransom pay-ments.They neglected to automate the money collection in a way that would scale.And then there was the matter of the kill switch.No one is quite certain why the attackers coded a self-destruct burton into their software,yet that's precisely what they did,Marcus Hutchins,a 22-year-old security researcher based in England who goes by MalwareTech,stumbled on the power plug largely by accident.After taking lunch on that Friday aftemoon,he inspected the malware and noticed a specific web address encoded within.Curious,he registered the domain for less than$11.This simple aci stopped the malware,killing the virus'ability to spread and buying Lime for organizations to upgrade their software and deploy protections.The most suitable title for the text is_____A.An Unsuccessful Malware AttackB.Cyber Crime:Hard to PreventC.A Widespread Computer VirusD.WannaCry:New Malicious Software
选项
A.An Unsuccessful Malware Attack
B.Cyber Crime:Hard to Prevent
C.A Widespread Computer Virus
D.WannaCry:New Malicious Software
答案
A
解析
主旨题。本题需综合各段首句。第一段首句提到ransomware attack.an abject failure等关键词;第二段首句提到malicious software,WannaCry等关键词;第三段首句出现the criminals'self defeating mistakes这一关键词;第四段首句出现the attackers,self-destruct but-ton等关键词。文章讨论WannaCr恶意软件攻击,从首段就指出它既是一次成功,也是一次失败,尤其第三、四段着重讨论该软件的缺陷,其中abject failure,self-defeating mistakes,self-destruct都是明显提示。故[A]与原文主旨最接近,其中unsuccessful=failure.self-de-feating mistakes.self-destruct等词。选项[B]cyber crime强调“网络犯罪”,而非“恶意软件”,故排除。选项[C]computer virus强调“电脑病毒”,[D]malicious software强调“恶意软件”,但都没体现failure这一关键词,故排除。综上.[A]为本题答案。
转载请注明原文地址:https://tihaiku.com/xueli/2700405.html
本试题收录于:
英语二研究生题库研究生入学分类
英语二研究生
研究生入学
相关试题推荐
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
随机试题
TheChinesegovernmenthasofferedgreatsupporttoTibetintermsofmanpower,m
Congestedcitiesarefastbecomingtesttubesforscientistsstudyingthei
假设你是小明,光明中学的学生,你给你的好友小华写信讲述你的美国之行。内容包括:先
甲公司主要从事塑料制品K的生产。20×8年4月16日,甲公司与某外商乙公司签订了
银行对工程设计方案进行分析评估,就是要分析工程设计方案是否可靠。()
细胞膜型Ig合成中恒定区基因所连接的外显子是()A.CμB.SCC.MCD.σ
大雁在飞翔时的队形,有时是“一”字形,有时是“人”字形。影响它们飞翔时队形变化的
对于发作不频繁、个数较少、溃疡期较长的患者,为了减轻症状、促进溃疡面早日愈合,可
承包人应在()向发包人提交预付款支付申请。A.签订合同时 B.签订合同后
可传递抑制信号的是( )。A.KIR B.KAR C.TCR D.MBL
最新回复
(
0
)