首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
LONDON—Security experts are warning that the global cyberattack that began on Friday is likely to be magnified in the new work
LONDON—Security experts are warning that the global cyberattack that began on Friday is likely to be magnified in the new work
admin
2022-01-20
70
问题
LONDON—Security experts are warning that the global cyberattack that began on Friday is likely to be magnified in the new workweek as users return to their offices and turn on their computers. Many workers, particularly in Asia, had already logged off on Friday when the malicious soft ware, stolen from the United States government, began proliferating across computer systems around the world. So the true impact of the attack may emerge on Monday as employees return and log in. Moreover, copycat variants of the malicious software behind the attacks are likely to spread, since the malware uses mostly open-source code and is easily replicable.
Rob Wainwright, the executive director of Europol, said on Sunday that the attacks had hit 200,000 computers in more than 150 countries. Among the organizations hit were FedEx in the United States, the Spanish telecom giant Telefonica, the French automaker Renault, universities in China, Germany’s federal railway system and Russia’s powerful Interior Ministry. The most disruptive attacks infected Britain’s public health system, where surgeries had to be rescheduled and some patients were turned away from emergency rooms. Nancy Harper, who went to the hospital for an X-ray, said: "It’s concerning that the N.H.S. was dependent on these outdated systems. If your average person has access to cheap cloud storage these days, then hospitals should be using similar backup methods. I hope this was a wake-up call."
"We could see more attacks if people start to copycat this attack," Matthieu Suiche added. A 22-year-old British researcher who uses the Twitter name Malware Tech has been credited with inadvertently helping to
stanch
the spread of the assault by identifying the web domain for the hackers’ "kill switch"—a way of disabling the malware.
Governments around the world were bracing themselves for the start of the workweek. "This is crucial for businesses when reopening on Monday: Please be aware and anticipate, and take preventive steps against the Wanna Cry malware attack," Indonesia’s communication and information minister, Rudiantara, who like many Indonesians uses only one name, said at a news conference. He advised those hit by the malware against paying the $300 to $600 in Bitcoin demanded as ransom to regain access to encrypted data, since there was no assurance that the extortionists would decrypt the files as promised.
The meaning of the word "stanch" (Para. 3) is similar to________.
选项
A、accelerate
B、release
C、promote
D、stop
答案
D
解析
含义题。根据题干关键词定位到文章第二段最后一句…has been credited with in advertently helping to stanch the spread of the assault by identifying the web domain for the hackers “kill switch” away of disabling the malware,通过破折号后所表述的内容 “禁用恶意软件的一种方式”可推断出,这种方式“阻止”了恶意软件攻击的扩散。A项意为“加速”,B项意为“释放”,C项意为“促进”,D项意为“阻止”。故本题选D。
转载请注明原文地址:https://www.kaotiyun.com/show/ubi4777K
0
考研英语二
相关试题推荐
Togivepraise______thegivernothingbutamoment’sthoughtandamoment’seffort.
ThemajordifferencebetweennarrativesalesandsuggestivesalesisthatMindycomparessalespeopletowinestewardsinthat_
Excitement,fatigue,andanxietycanallbedetectedfromsomeone’sblinks,accordingtopsychologistJohnStern(21)Washington
Excitement,fatigue,andanxietycanallbedetectedfromsomeone’sblinks,accordingtopsychologistJohnStern(21)Washington
Accordingtothepassage,thefactthatyoungpeopleseemtobelosinginterestinscience______.Thesecondparagraphismain
IwasaddressingasmallgatheringinasuburbanVirginialivingroom-awomen’sgroupthathadinvitedmentojointhem.Through
TheoutbreakofswinefluthatwasfirstdetectedinMexicowasdeclaredaglobalepidemiconJune11,2009.Itisthefirstworld
Peopleinbusinesscanuseforesighttoidentifynewproductsandservices,aswellasmarketsforthoseproductsandservices.
Theterm"Followyourpassion"hasincreasedninefoldinEnglishbookssince1990."Findsomethingyoulovetodoandyou’llnev
Technologyissupposedtomakeourliveseasier,allowingustodothingsmorequicklyandefficiently.Buttoooftenitseemst
随机试题
小儿结核性脑膜炎的早期临床表现是
无论因何种情况,土地使用者依法取得的土地使用权,国家都无权提前收回。()
就某私人的出租住宅进行交易价格评估时,你认为可以优先选用哪三种估价方法?分别需要搜集哪些资料?
1.背景资料:某公司中标承建日消纳量为200t的大型城市垃圾填埋场工程,地点位于城郊山坳。渗出液依地势排人邻近的污水处理厂,进水井为跌水方式,水面落差5.0m,采用预制沉井法施工。施工项目部技术负责人编制了工程施工组织设计,按照规定获准后组织实施
范例教学模式体现了问题教学与系统学习、掌握知识与发展能力的统一。下列关于范例教学模式的描述,正确的是()。
下列关于法治与法制的表述正确的有()。(2012年多选46)
在世界历史上,19世纪经济上落后的德国却成为欧洲最先进思想的发源地,这一事件最突出地表明( )
在考生文件夹下有一个工程文件sjt5.vbp,其窗体上有一个名称为Text1的文本框;还有两个名称分别为C1、C2的命令按钮,标题分别为“计算”、“存盘”。有一个函数过程isprime(a)可以在程序中直接调用,其功能是判断参数a是否为素数,如果是素数,则
ConsideringhowjazzistranscribedinChinese,youmaybemisledintoassumingthatitisaculturalformbelongingtothosewh
A、Oneshouldbecompensatedforworkingovertime.B、Oneshouldhaveadetaileddailyplanonhiswork.C、It’shardtobalancewo
最新回复
(
0
)