问题 单项选择题

Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an (6) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (7) . Upon running, such worms usually proceed to send themselves out to email addresses from the victim’s address book, previous emails, web pages (8) .

As administrators seek to block dangerous email attachments through the recognition of well-known (9) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the (10) access to your network.

10()

A.cracker

B.user

C.customer

D.client

答案

参考答案:A

解析:

本题涉及蠕虫病毒的相关知识,参考译文如下。

Melissa和LoveLetter利用朋友或同事之间存在的信任,想象一下从朋友那里收到一个附件并要求你打开它,这是Melissa和一些其他电子邮件蠕虫病毒经常发生的事情。一旦运行,这种蠕虫病毒通常将自己发送到被感染者的地址簿、先前的电子邮件、网页缓存保存的邮件地址中。

由于管理员一般通过识别众所周知的扩展名来搜索和阻止危险的电子邮件附件,所以病毒作者使用其他扩展名来绕过这种保护。可执行文件(.exe)被重新命名为“bat”和“cmd”加上其他扩展名的整个列表,它仍将运行并成功地感染目标用户。

通常情况下,黑客通过发送看起来像Flash影片的附件来渗入网络,这些影片在展示一些可爱的动画的同时在后台运行命令窃取你的密码使黑客访问你的网络。

单项选择题
判断题