首页
登录
学历类
Text 1 What has been described as the la
Text 1 What has been described as the la
免费题库
2022-08-02
25
问题
Text 1 What has been described as the largest ever ransomware attack-a cyber criminal scheme that locks up computer files until vicLims pay a ransom-holds the paradoxical disLinction of being both an outrageous success(in terms of its blast radius)as well as an abject failure(in terms of its h8ul).The malicious software spread so far and wide,jammed up so many IT networks and generated so much panic and chaos that the wronE;doers effectively undid themselves.On May 12,the world awoke to the beginnings of hundreds of thousands of old Microsoft Win-dows based computers'seizing up as Lhey subjected to a malicious software,appropriately called WannaCry.Within hours,the digital epidemic circled the globe like the Spanish flu,infecting ma-chines running outdated operating systems in some 150 countries,spreading across numerous homes and corporate networks.The attack,which relied on powerful tools believed to have been developed by the NSA and leaked online in April by a group of hackers known as the Shadow Brokers,wormed its way through businesses,hospitals and govemments,all of which found themselves suddenly locked out of their own systems.Researchers detected the wave quickly,and it wasn't long before they picked up on the criminals'self-defeating mistakes.The attackers failed to assign each victim a separate Bitcoin wallet,researchers noted,a criiical error that meant they would not be able to easily Lrack ransom pay-ments.They neglected to automate the money collection in a way that would scale.And then there was the matter of the kill switch.No one is quite certain why the attackers coded a self-destruct burton into their software,yet that's precisely what they did,Marcus Hutchins,a 22-year-old security researcher based in England who goes by MalwareTech,stumbled on the power plug largely by accident.After taking lunch on that Friday aftemoon,he inspected the malware and noticed a specific web address encoded within.Curious,he registered the domain for less than$11.This simple aci stopped the malware,killing the virus'ability to spread and buying Lime for organizations to upgrade their software and deploy protections.Researchers held that the attack was____A.criticalB.flawlessC.defectiveD.invulnerable
选项
A.critical
B.flawless
C.defective
D.invulnerable
答案
C
解析
观点题。根据题干关键词researchers定位到第三段。其中researchers held=researchers noted,the attack=the attackers,故答案句为:The attackers failed to ass.gn each victim a separate Bitcoin wallet...其中关键词为failed to“未能够”这一明显的负面词汇;原文的self-defeating mistakes,a critical errar也是明显提示,这些词都体现出这次“攻击”是有缺陷的。四个选项分别为:[A]critical“批评的”;[B]flawless“完美的,无瑕疵的”;[C]defective“有缺陷的,不完美的”;[D]invulnerable“无懈可击的”。故本题答案为[C]。
转载请注明原文地址:https://tihaiku.com/xueli/2700406.html
本试题收录于:
英语二研究生题库研究生入学分类
英语二研究生
研究生入学
相关试题推荐
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
随机试题
[originaltext]Theice-creamsundaeisanoriginalAmericandish.Icecreami
护士应如何提供跨文化护理措施?
“强力集团”又称“俄罗斯五人团”,是19世纪中期出现的一个作曲家小组,成员包括巴
Fornearlytenyears,theUnifiedModeli
过敏性紫癜的实验室检查对确诊比较有价值的是A.病变血管免疫荧光检查B.骨髓象检查
属于临床护理活动终末质量评价的是A.护理人员数量 B.护理器械设备的性能 C
住房置业担保公司的组织形式可以为()。A.事业单位 B.合伙制企业 C.有
下列情形可采用c控制图的有()。 A.机器设备的不合格数或故障次数B.啤酒
以下符合《银行业从业人员职业操守》的制订目的的是()。 A.规范银行业从业人
依据我国建筑法规定.勘察、设计文件应当符合()。A.建筑工程质量标准
最新回复
(
0
)