Melissa and LoveLetter made use of the trust that exists between friends orcolleagues.Imagine receiving an (71) from a friend who asks you to open it.This is whathappens with Melissa and several other similar email (72) .Upon running,such wormsusually proceed to send themselves out to email addresses from the victim’s address book,previous emails,web pages (73) .
A.cracker B.user C.customer D.client
As administrators seek to block dangerous email attachments through the recognition ofwell—known (74) ,virus writers use other extensions to circumvent such protection.Executable(.exe)files are renamed to.bat and.cmd plus a whole list of other extensions and wilt still runand successfully infect target users.
Frequently,hackers try to penetrate networks by sending an attachment that
looks like a flash movie,which,while displaying some cute animation,simultaneouslyruns commands in the background to steal your passwords and give the (75) access to yournetwork.
供选择答案:
参考答案:A
解析:Melissa病毒和LoveLetter病毒充分利用了朋友和同事之间的信任。想象一下这种情况:你的朋友发一个附件给你,叫你打开它。Melissa和其他类似的蠕虫病毒都采用这种
语句给出了(4)、(5)的答案。
option subnet-mask 255.255.255.0;
option broadcast-address 192.168.1.255;
option domain-name-servers 192.168.1.3:
分别给出了掩码、网关和域名服务器的值。