首页
登录
学历类
Text 1 What has been described as the la
Text 1 What has been described as the la
免费题库
2022-08-02
51
问题
Text 1 What has been described as the largest ever ransomware attack-a cyber criminal scheme that locks up computer files until vicLims pay a ransom-holds the paradoxical disLinction of being both an outrageous success(in terms of its blast radius)as well as an abject failure(in terms of its h8ul).The malicious software spread so far and wide,jammed up so many IT networks and generated so much panic and chaos that the wronE;doers effectively undid themselves.On May 12,the world awoke to the beginnings of hundreds of thousands of old Microsoft Win-dows based computers'seizing up as Lhey subjected to a malicious software,appropriately called WannaCry.Within hours,the digital epidemic circled the globe like the Spanish flu,infecting ma-chines running outdated operating systems in some 150 countries,spreading across numerous homes and corporate networks.The attack,which relied on powerful tools believed to have been developed by the NSA and leaked online in April by a group of hackers known as the Shadow Brokers,wormed its way through businesses,hospitals and govemments,all of which found themselves suddenly locked out of their own systems.Researchers detected the wave quickly,and it wasn't long before they picked up on the criminals'self-defeating mistakes.The attackers failed to assign each victim a separate Bitcoin wallet,researchers noted,a criiical error that meant they would not be able to easily Lrack ransom pay-ments.They neglected to automate the money collection in a way that would scale.And then there was the matter of the kill switch.No one is quite certain why the attackers coded a self-destruct burton into their software,yet that's precisely what they did,Marcus Hutchins,a 22-year-old security researcher based in England who goes by MalwareTech,stumbled on the power plug largely by accident.After taking lunch on that Friday aftemoon,he inspected the malware and noticed a specific web address encoded within.Curious,he registered the domain for less than$11.This simple aci stopped the malware,killing the virus'ability to spread and buying Lime for organizations to upgrade their software and deploy protections.Researchers held that the attack was____A.criticalB.flawlessC.defectiveD.invulnerable
选项
A.critical
B.flawless
C.defective
D.invulnerable
答案
C
解析
观点题。根据题干关键词researchers定位到第三段。其中researchers held=researchers noted,the attack=the attackers,故答案句为:The attackers failed to ass.gn each victim a separate Bitcoin wallet...其中关键词为failed to“未能够”这一明显的负面词汇;原文的self-defeating mistakes,a critical errar也是明显提示,这些词都体现出这次“攻击”是有缺陷的。四个选项分别为:[A]critical“批评的”;[B]flawless“完美的,无瑕疵的”;[C]defective“有缺陷的,不完美的”;[D]invulnerable“无懈可击的”。故本题答案为[C]。
转载请注明原文地址:https://tihaiku.com/xueli/2700406.html
本试题收录于:
英语二研究生题库研究生入学分类
英语二研究生
研究生入学
相关试题推荐
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
随机试题
Theimportanceandfocusoftheinterviewintheworkoftheprintandbroad
Theconference________sosuccessfulifwehadn’tmadeadequatepreparation.A、cou
It【C1】______aroundnineo’clockwhenIdrove【C2】______homefromworkbecause
Knowledgemaybeacquiredthroughconversation,watchingtelevisionortrave
根据表10-11的二人同时博弈模型,求:(1)参与人A与B的期望支付。(2
某机械设备股份有限公司2009年和2010年主要财务数据如表所示。 根
证券清算是证券公司以()为对手办理清算与交收。A:中国证券登记结算有限责任公司
期货公司办理下列事项,应由国务院期货监督管理机构批准的是()。A.变更法定
下列不同计价方式的合同中,建设单位最难控制工程造价的是()。A.成本加百分比酬
某患者经常毁坏黑颜色的物品、电话机、衣服等,谓"黑色要我死亡"此症状属A.病理性
最新回复
(
0
)