首页
登录
职称英语
[originaltext] Imagine hackers stealing top secret files from a military bas
[originaltext] Imagine hackers stealing top secret files from a military bas
游客
2024-04-08
35
管理
问题
Imagine hackers stealing top secret files from a military base. What if they don’t need the Internet to pull data out of the facility’s computers? Instead, they can just infect an office printer and—with software alone— turn it into a radio. This sounds like sci-fi, but it’s now possible.(9)Security researchers at a Manhattan startup have discovered how to make any modern device—printer, washing machine, air conditioner— broadcast invisible, inaudible signals for miles. That’s a game changer and a huge step forward for hackers.
The rapidly expanding $77 billion cybersecurity industry is all about guarding computer networks. Companies and governments buy products to stay protected. But they keep running out of effective defensive options. That’s where Ang Cui and his team of bright researchers come in. They found a way to sneak data out of a computer network without setting off any alarms.(10)It’s groundbreaking research, because it also hints at the ability to steal data from computers that aren’t even connected to the Internet, like those at nuclear facilities.
Last week, the team at Red Balloon Security demonstrated how it works to several news reporters. They infected a Pantum laser printer and toyed with its circuits, making it do something it was never meant to. By quickly switching a chip’s energy output back and forth, the printer emits electromagnetic radiation. The Red Balloon team calls it a "funtenna. "(11)In fact, one of the only ways to detect this highly advanced tactic is by walking around with an AM radio. If you get near a device and the radio static is interrupted by loud beeping, it’s secretly transmitting radio signals.
Questions 9 to 11 are based on the passage you have just heard.
9. What did the security researchers at a Manhattan startup discover?
10. Why is the new hacking tactic groundbreaking?
11. How to prevent the highly advanced tactic stealing data from computers?
选项
A、How to safeguard the computer network.
B、How to steal top secret files from a military base.
C、How to make modern devices broadcast invisible, inaudible signals.
D、How to use an FM radio to detect the invisible, inaudible signals.
答案
C
解析
转载请注明原文地址:https://tihaiku.com/zcyy/3546180.html
相关试题推荐
[originaltext]Hello,I’mCallumRobertsonandyou’relisteningtothemusic
[originaltext]Hello,I’mCallumRobertsonandyou’relisteningtothemusic
[originaltext]Hello,I’mCallumRobertsonandyou’relisteningtothemusic
[originaltext]AbeetleinvasionintheUnitedStateshaskilledatleasttw
[originaltext]Pianosarenormallyfoundinbuildingforobviousreasons.Ho
[originaltext]Pianosarenormallyfoundinbuildingforobviousreasons.Ho
[originaltext]W:Hi,Dr.Hyde.M:So,whatseemstobetheproblemtoday?W:We
[originaltext]W:Dad,youalwaysloveme,don’tyou?M:Sure.But,wait,wait.
[originaltext]W:Themountainseemstohavegrown,IfeelsodizzywhenIclimb
[originaltext]W:Themountainseemstohavegrown,IfeelsodizzywhenIclimb
随机试题
"TheLostGeneration"whichGertrudeSteinusedtodescribesuchwritersasDos
[originaltext]W:Hey,Taxi!Ah,greatThanksforpullingover.M:Whereto?W:
A.生理盐水灌肠 B.肥皂水灌肠 C.两者均可用 D.两者均不可用糖尿病昏
“四风”问题的形成是一个长期的过程,具有反复性和顽固性,其背后是________
某运输企业于2016年年初投资3000万元购买一台设备,预计使用期限为10年,年
下列指标中与巨幼细胞性贫血无关的是A:细胞核的发育落后于胞质B:MCV110~
女性,30岁。左腰部撞伤3小时。患者诉左侧腰痛,有压痛,未及肿块.生命体征稳定。
患者,女,60岁,口腔干燥、无泪、双眼异物感1年余。两侧腮腺区有反复肿胀史。检查
两瓶不同种类的气体,分子平均平动动能相等,但气体密度不同,则()。A.温
在某工程双代号网络计划中,工作N的最早开始时间和最迟开始时间分别为第20天和第2
最新回复
(
0
)