首页
登录
学历类
Text 1 What has been described as the la
Text 1 What has been described as the la
免费题库
2022-08-02
57
问题
Text 1 What has been described as the largest ever ransomware attack-a cyber criminal scheme that locks up computer files until vicLims pay a ransom-holds the paradoxical disLinction of being both an outrageous success(in terms of its blast radius)as well as an abject failure(in terms of its h8ul).The malicious software spread so far and wide,jammed up so many IT networks and generated so much panic and chaos that the wronE;doers effectively undid themselves.On May 12,the world awoke to the beginnings of hundreds of thousands of old Microsoft Win-dows based computers'seizing up as Lhey subjected to a malicious software,appropriately called WannaCry.Within hours,the digital epidemic circled the globe like the Spanish flu,infecting ma-chines running outdated operating systems in some 150 countries,spreading across numerous homes and corporate networks.The attack,which relied on powerful tools believed to have been developed by the NSA and leaked online in April by a group of hackers known as the Shadow Brokers,wormed its way through businesses,hospitals and govemments,all of which found themselves suddenly locked out of their own systems.Researchers detected the wave quickly,and it wasn't long before they picked up on the criminals'self-defeating mistakes.The attackers failed to assign each victim a separate Bitcoin wallet,researchers noted,a criiical error that meant they would not be able to easily Lrack ransom pay-ments.They neglected to automate the money collection in a way that would scale.And then there was the matter of the kill switch.No one is quite certain why the attackers coded a self-destruct burton into their software,yet that's precisely what they did,Marcus Hutchins,a 22-year-old security researcher based in England who goes by MalwareTech,stumbled on the power plug largely by accident.After taking lunch on that Friday aftemoon,he inspected the malware and noticed a specific web address encoded within.Curious,he registered the domain for less than$11.This simple aci stopped the malware,killing the virus'ability to spread and buying Lime for organizations to upgrade their software and deploy protections.Researchers held that the attack was____A.criticalB.flawlessC.defectiveD.invulnerable
选项
A.critical
B.flawless
C.defective
D.invulnerable
答案
C
解析
观点题。根据题干关键词researchers定位到第三段。其中researchers held=researchers noted,the attack=the attackers,故答案句为:The attackers failed to ass.gn each victim a separate Bitcoin wallet...其中关键词为failed to“未能够”这一明显的负面词汇;原文的self-defeating mistakes,a critical errar也是明显提示,这些词都体现出这次“攻击”是有缺陷的。四个选项分别为:[A]critical“批评的”;[B]flawless“完美的,无瑕疵的”;[C]defective“有缺陷的,不完美的”;[D]invulnerable“无懈可击的”。故本题答案为[C]。
转载请注明原文地址:https://tihaiku.com/xueli/2700406.html
本试题收录于:
英语二研究生题库研究生入学分类
英语二研究生
研究生入学
相关试题推荐
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
随机试题
[originaltext]M:Hello,WilliamSmith’sspeaking,whatcanIdoforyou?W:Hel
UKNewspapersI.Introduction—manynationalnewspapers—nonational【T1】______
建设单位在工程竣工验收合格之日起15日内未办理工程竣工验收备案的,备案机关责令限
已知某公司当前资金结构如下: 因生产发展,公司年初准备增加资金2500万元
2020年1-10月,我国规模以上互联网和相关服务企业(简称互联网企业)完成业务
在依法收贷中,债务人应当自收到支付令之日起()日内向债权人清偿债务,或者向人民
昆布与海藻均有的功效是A.消痰软坚、清心定惊 B.消痰软坚,利水消肿 C.消
在工程建设设计进度控制计划体系中,需要考虑设计分析和评审的工作时间安排的进度计划
A. B. C. D.
下列施工作业内容中,需要编制施工方案的有()。2017A.大型设备吊装 B.支
最新回复
(
0
)