首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
LONDON—Security experts are warning that the global cyberattack that began on Friday is likely to be magnified in the new workwe
LONDON—Security experts are warning that the global cyberattack that began on Friday is likely to be magnified in the new workwe
admin
2019-11-20
83
问题
LONDON—Security experts are warning that the global cyberattack that began on Friday is likely to be magnified in the new workweek as users return to their offices and turn on their computers. Many workers, particularly in Asia, had already logged off on Friday when the malicious software, stolen from the United States government, began proliferating across computer systems around the world. So the true impact of the attack may emerge on Monday as employees return and log in. Moreover, copycat variants of the malicious software behind the attacks are likely to spread, since the malware uses mostly open-source code and is easily replicable.
Rob Wainwright, the executive director of Europol, said on Sunday that the attacks had hit 200,000 computers in more than 150 countries. Among the organizations hit were FedEx in the United States, the Spanish telecom giant Telef6nica, the French automaker Renault, universities in China, Germany’s federal railway system and Russia’s powerful Interior Ministry. The most disruptive attacks infected Britain’s public health system, where surgeries had to be rescheduled and some patients were turned away from emergency rooms. Nancy Harper, who went to the hospital for an X-ray, said: "It’s concerning that the N.H.S. was dependent on these outdated systems. If your average person has access to cheap cloud storage these days, then hospitals should be using similar backup methods. I hope this was a wake-up call."
"We could see more attacks if people start to copycat this attack," Matthieu Suiche added. A 22-year-old British researcher who uses the Twitter name Malware Tech has been credited with inadvertently helping to
stanch
the spread of the assault by identifying the web domain for the hackers’ "kill switch"—a way of disabling the malware.
Governments around the world were bracing themselves for the start of the workweek. "This is crucial for businesses when reopening on Monday: Please be aware and anticipate, and take preventive steps against the Wanna Cry malware attack," Indonesia’s communication and information minister, Rudiantara, who like many Indonesians uses only one name, said at a news conference. He advised those hit by the malware against paying the $300 to $600 in Bitcoin demanded as ransom to regain access to encrypted data, since there was no assurance that the extortionists would decrypt the files as promised.
According to Paragraph 1, which one of the following about malicious software is NOT true?
选项
A、It comes from the United States government.
B、When it is released, the true impact of attack emerges immediately.
C、The reproductive variants of it are likely to transmit.
D、It is easily copied.
答案
B
解析
细节题。根据题干关键词定位到文章第一段。A项与原文stolen from the United States government出处一致。C、D两项中关键词reproductive variants,transmit和copied可在该段最后一句Moreover,copycat variants of the malicious software behind the attacks are likely to spread,since the malware uses mostly open-source code and is easily replicable中找到相关信息,其中transmit(传播),copied(复制)分别是该句中spread和replicable的同义转化。B项意为“恶意软件从互联网上释放出来时.这次攻击的真正影响就立即表现出来”,根据选项关键词true impact可定位到第三句So the true impact of the attack may emerge on Monday as employees return and log in,即“这次攻击的真正影响也许在员工周一上班、登录计算机时才会表现出来”,因此B项表述错误,故本题选B。
转载请注明原文地址:https://www.kaotiyun.com/show/S4e4777K
0
考研英语二
相关试题推荐
Accordingtothepassage,thefactthatyoungpeopleseemtobelosinginterestinscience______.Thebesttitleforthepassa
Amajorreasonforconflictintheanimalworldisterritory.Themaleanimal(21)anarea.Thesizeoftheareaissufficientt
Youstillneedsomesubstantialexamples______supportofyourargument,orfewpeoplewillbelieveinyouridea.
TheoutbreakofswinefluthatwasfirstdetectedinMexicowasdeclaredaglobalepidemiconJune11,2009.Itisthefirstworld
TheoutbreakofswinefluthatwasfirstdetectedinMexicowasdeclaredaglobalepidemiconJune11,2009.Itisthefirstworld
WilltheEuropeanUnionmakeit?Thequestionwouldhavesoundedstrangenotlongago.Noweventheproject’sgreatestcheerlead
WilltheEuropeanUnionmakeit?Thequestionwouldhavesoundedstrangenotlongago.Noweventheproject’sgreatestcheerlead
Prettyinpink:adultwomendonotrememberbeingsoobsessedwiththecolour,yetitispervasiveinouryounggirls’lives.It
Homeworkhasneverbeenterriblypopularwithstudentsandevenmanyparents,butinrecentyearsithasbeenparticularlyscorn
SomeoftheconcernssurroundingTurkey’sapplicationtojointheEuropeanUnion,tobevotedonbytheEU’sCouncilofMinister
随机试题
用成形铣刀铣削直线成形面时应注意哪些事项?
卵细胞质内单精子注射(ICSI)的适应证,以下哪项不正确
咨询工程师在提交咨询成果阶段的主要工作是()。
在渗透变形中,土颗粒从土体中流出的现象叫()。
根据以下资料。回答以下题。2008年上半年,全社会固定资产投资68402亿元,同比增长26.3%。其中,城镇固定资产投资58436亿元,增长26.8%;农村投资9966亿元,增长23.2%。在城镇投资中,国有及国有控股投资23554亿元,同比增长1
有的领导干部为了维护个人和小团体的______,本着“你不犯我,我不犯你”的态度,相互“高抬贵手”,乃至相互“补台”,这种“和气”蔓延后最终是同上贼船。填入横线部分最恰当的一项是()。
阅读下文。回答86—90题。科学家在7000名志愿者的协助下,联合研制成功了“电子大脑”。这是科学史上第一次制成能够“解读”思维的“人脑图”。设计者说,这是一项未来技术,将帮助人类理解人体最复杂的“机器”的工作原理。美国洛杉矶大学神经细胞扫
专化防御和反专化防御是物种进化过程中的两种反应类型。前者是指丽种物种在防御方面的协同进化过程中所做出的特定进化反应。例如:加纳园蛛在黄昏时把网建成,而到黎明时又把网拆毁以对付猎蛛蜂白天对其捕食。反专化防御是相对专化防御而言的,是指物种为破除其他物种的专化防
—DidCharlesvoteinthelastelection?—No,hewasn’t______.
可见,不同于美国的电子书读者,中国的电子书读者并不是转投新媒介的传统购书者。
最新回复
(
0
)