首页
登录
学历类
Text 1 What has been described as the la
Text 1 What has been described as the la
免费题库
2022-08-02
56
问题
Text 1 What has been described as the largest ever ransomware attack-a cyber criminal scheme that locks up computer files until vicLims pay a ransom-holds the paradoxical disLinction of being both an outrageous success(in terms of its blast radius)as well as an abject failure(in terms of its h8ul).The malicious software spread so far and wide,jammed up so many IT networks and generated so much panic and chaos that the wronE;doers effectively undid themselves.On May 12,the world awoke to the beginnings of hundreds of thousands of old Microsoft Win-dows based computers'seizing up as Lhey subjected to a malicious software,appropriately called WannaCry.Within hours,the digital epidemic circled the globe like the Spanish flu,infecting ma-chines running outdated operating systems in some 150 countries,spreading across numerous homes and corporate networks.The attack,which relied on powerful tools believed to have been developed by the NSA and leaked online in April by a group of hackers known as the Shadow Brokers,wormed its way through businesses,hospitals and govemments,all of which found themselves suddenly locked out of their own systems.Researchers detected the wave quickly,and it wasn't long before they picked up on the criminals'self-defeating mistakes.The attackers failed to assign each victim a separate Bitcoin wallet,researchers noted,a criiical error that meant they would not be able to easily Lrack ransom pay-ments.They neglected to automate the money collection in a way that would scale.And then there was the matter of the kill switch.No one is quite certain why the attackers coded a self-destruct burton into their software,yet that's precisely what they did,Marcus Hutchins,a 22-year-old security researcher based in England who goes by MalwareTech,stumbled on the power plug largely by accident.After taking lunch on that Friday aftemoon,he inspected the malware and noticed a specific web address encoded within.Curious,he registered the domain for less than$11.This simple aci stopped the malware,killing the virus'ability to spread and buying Lime for organizations to upgrade their software and deploy protections.Researchers held that the attack was____A.criticalB.flawlessC.defectiveD.invulnerable
选项
A.critical
B.flawless
C.defective
D.invulnerable
答案
C
解析
观点题。根据题干关键词researchers定位到第三段。其中researchers held=researchers noted,the attack=the attackers,故答案句为:The attackers failed to ass.gn each victim a separate Bitcoin wallet...其中关键词为failed to“未能够”这一明显的负面词汇;原文的self-defeating mistakes,a critical errar也是明显提示,这些词都体现出这次“攻击”是有缺陷的。四个选项分别为:[A]critical“批评的”;[B]flawless“完美的,无瑕疵的”;[C]defective“有缺陷的,不完美的”;[D]invulnerable“无懈可击的”。故本题答案为[C]。
转载请注明原文地址:https://www.tihaiku.com/xueli/2700406.html
本试题收录于:
英语二研究生题库研究生入学分类
英语二研究生
研究生入学
相关试题推荐
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
Text1Whathasbeendescribedasthela
随机试题
Whichofthefollowingsentencesindicates"probability"?A、Thestadiumcanbeem
Thispassageismainlyaboutsomesocialandculturalchangesof1970sand1980s
()是指在建筑的外墙上设置的全部敞开的楼梯。A.敞开楼梯间 B.封闭楼梯
某操作系统文件管理采用索引节点法。每个文件的索引节点有8个地址项,每个地址项大小
《飞天畅想》
下列装修材料中,属于A级装修材料的是()。A.铝箔复合材料 B.玻璃棉板
低氧对呼吸的刺激作用是通过 A.直接兴奋延髓吸气中枢 B.直接刺激呼吸中枢
共用题干 下面是某求助者MMPI-2的测验结果:关于该求助者的测验结果,正确的
合理用药基本原则中首要考虑的是()A.有效 B.安全 C.经济 D.使用方
最新回复
(
0
)