首页
登录
学历类
Text 1 What has been described as the la
Text 1 What has been described as the la
最全题库
2022-08-02
46
问题
Text 1 What has been described as the largest ever ransomware attack-a cyber criminal scheme that locks up computer files until vicLims pay a ransom-holds the paradoxical disLinction of being both an outrageous success(in terms of its blast radius)as well as an abject failure(in terms of its h8ul).The malicious software spread so far and wide,jammed up so many IT networks and generated so much panic and chaos that the wronE;doers effectively undid themselves.On May 12,the world awoke to the beginnings of hundreds of thousands of old Microsoft Win-dows based computers'seizing up as Lhey subjected to a malicious software,appropriately called WannaCry.Within hours,the digital epidemic circled the globe like the Spanish flu,infecting ma-chines running outdated operating systems in some 150 countries,spreading across numerous homes and corporate networks.The attack,which relied on powerful tools believed to have been developed by the NSA and leaked online in April by a group of hackers known as the Shadow Brokers,wormed its way through businesses,hospitals and govemments,all of which found themselves suddenly locked out of their own systems.Researchers detected the wave quickly,and it wasn't long before they picked up on the criminals'self-defeating mistakes.The attackers failed to assign each victim a separate Bitcoin wallet,researchers noted,a criiical error that meant they would not be able to easily Lrack ransom pay-ments.They neglected to automate the money collection in a way that would scale.And then there was the matter of the kill switch.No one is quite certain why the attackers coded a self-destruct burton into their software,yet that's precisely what they did,Marcus Hutchins,a 22-year-old security researcher based in England who goes by MalwareTech,stumbled on the power plug largely by accident.After taking lunch on that Friday aftemoon,he inspected the malware and noticed a specific web address encoded within.Curious,he registered the domain for less than$11.This simple aci stopped the malware,killing the virus'ability to spread and buying Lime for organizations to upgrade their software and deploy protections.The most suitable title for the text is_____A.An Unsuccessful Malware AttackB.Cyber Crime:Hard to PreventC.A Widespread Computer VirusD.WannaCry:New Malicious Software
选项
A.An Unsuccessful Malware Attack
B.Cyber Crime:Hard to Prevent
C.A Widespread Computer Virus
D.WannaCry:New Malicious Software
答案
A
解析
主旨题。本题需综合各段首句。第一段首句提到ransomware attack.an abject failure等关键词;第二段首句提到malicious software,WannaCry等关键词;第三段首句出现the criminals'self defeating mistakes这一关键词;第四段首句出现the attackers,self-destruct but-ton等关键词。文章讨论WannaCr恶意软件攻击,从首段就指出它既是一次成功,也是一次失败,尤其第三、四段着重讨论该软件的缺陷,其中abject failure,self-defeating mistakes,self-destruct都是明显提示。故[A]与原文主旨最接近,其中unsuccessful=failure.self-de-feating mistakes.self-destruct等词。选项[B]cyber crime强调“网络犯罪”,而非“恶意软件”,故排除。选项[C]computer virus强调“电脑病毒”,[D]malicious software强调“恶意软件”,但都没体现failure这一关键词,故排除。综上.[A]为本题答案。
转载请注明原文地址:https://www.tihaiku.com/xueli/2700405.html
本试题收录于:
英语二研究生题库研究生入学分类
英语二研究生
研究生入学
相关试题推荐
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
随机试题
(a)解释可流通汇票的主要特征。(1983年4月,1986年9月,1991年6月)(b)最重要的可流通票据有汇票、本票和支票。说出另外几种可以流通的
[originaltext]FamilyHolidaysStudentsinB
Asanxiety-makers,examinationsaresecondtonone.Thatisbecausesomuch
唐玄宗统治后期爆发的战乱是( )A.七国之乱 B.八王之乱 C.陈桥兵变
外墙贴面砖工程的施工中,石灰膏用于罩面灰,熟化时间不应小于()。A.20d
A.高选择性迷走神经切断术 B.胃大部切除术加淋巴结清扫术 C.胃大部切除术
A.牵正散B.消风散C.生化汤D.大秦艽汤E.川芎茶调散组成中含有苍术的方剂是
社会工作研究者周女士为了评估打工子弟学校学生的社会工作干预效果,需要设计问卷。一
下列不符合急性肾小管坏死的检查结果A、颗粒管型 B、尿比重<1.010 C、
(2012年真题)下列民事诉讼案件适用专属管辖的是()。A.保险合同纠纷 B
最新回复
(
0
)