首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
A、Some senior hackers. B、The government agencies. C、The security researchers. D、The game players. C
A、Some senior hackers. B、The government agencies. C、The security researchers. D、The game players. C
admin
2016-09-09
26
问题
Imagine hackers stealing top secret files from a military base. What if they don’t need the Internet to pull data out of the facility’s computers? Instead, they can just infect an office printer and—with software alone— turn it into a radio. This sounds like sci-fi, but it’s now possible.(9)Security researchers at a Manhattan startup have discovered how to make any modern device—printer, washing machine, air conditioner— broadcast invisible, inaudible signals for miles. That’s a game changer—and a huge step forward for hackers.
The rapidly expanding $77 billion cybersecurity industry is all about guarding computer networks. Companies and governments buy products to stay protected. But they keep running out of effective defensive options. That’s where Ang Cui and his team of bright researchers come in. They found a way to sneak data out of a computer network without setting off any alarms.(10)It’s groundbreaking research, because it also hints at the ability to steal data from computers that aren’t even connected to the Internet, like those at nuclear facilities.
Last week, the team at Red Balloon Security demonstrated how it works to several news reporters. They infected a Pantum laser printer and toyed with its circuits, making it do something it was never meant to. By quickly switching a chip’s energy output back and forth, the printer emits electromagnetic radiation. The Red Balloon team calls it a "funtenna".(11)In fact, one of the only ways to detect this highly advanced tactic is by walking around with an AM radio. If you get near a device and the radio static is interrupted by loud beeping, it’s secretly transmitting radio signals.
Questions 9 to 11 are based on the passage you have just heard.
9. Who discovered the new technology of making any modern device broadcast invisible signals?
10. Why is the new hacking tactic groundbreaking?
11. What is the best way to protect people from the new hacking tactic?
选项
A、Some senior hackers.
B、The government agencies.
C、The security researchers.
D、The game players.
答案
C
解析
转载请注明原文地址:https://kaotiyun.com/show/1KG7777K
0
大学英语六级
相关试题推荐
CertainphrasesonecommonlyhearsamongAmericanscapturetheirdevotiontoindividualism."Doyouownthing?""Ididitmyway
A、Thewomanshouldhaveregisteredearlier.B、Hewillhelpthewomansolvetheproblem.C、Hefindsithardtoagreewithwhatth
A、Itishelpfultofindfood.B、Itkeepsthemfromtheiroffspring.C、Itattractsbetterpartners.D、Itcanbepasseddowntoch
DanielDevlinlivesinthesamehousewithhischildrenandseesthemeveryday—yetheisunabletorecognizethematall.Mr.D
Globalindustrializationhaspouredcarboninthesky,andnowwemustpaytheprice:thenastyclimatechange,withitssinking
Fears,ingeneral,keepusfromreachingourfullpotential.Fearofsuccessisprobablyoneofthehardestfearstoidentify,a
A、Sheisanengineer.B、Sheisamathematician.C、Sheisthemanagerofacompany.D、Sheisanartist.A此题中出现了很多关于职业的选项。只要正确捕捉信息
A、Makeadecisionquickly.B、StudyItalianwithhim.C、Findoutaboutcourses.D、OffertoteachItalianatthecommunitycollege
ShoppingandtheInternet,MakingItClick[A]TerryLundgrenandKevinRyanknowandlikeeachother.Butwhenitcomestothef
Thehealth-careeconomyisfilledwithunusualandevenuniqueeconomicrelationships.Oneoftheleastunderstoodinvolvesthe
随机试题
继发性蛋白质一能量营养不良大多因疾病引起食欲下降、吸收不良、分解代谢亢进、消耗增加所致。()
计算曲线积分其中f(s)在(一∞,+∞)内有连续的导数,l为从点到B(1,2)的直线段.
A.Na+B.K+C.Cl-D.Ca2+E.HCO3-消化道平滑肌动作电位去极相主要是哪一种离子内流引起
臀位妊娠时,胎儿宫内窘迫的诊断依据是下列何项
水表是计量装置,住宅建筑应在配水管上和分户管上设置水表,安装()。
活动性原则源自于()的“做中学”。
如果考虑城市地区时把郊区也包括在内的话,那么加利福尼亚州就是城市人口比例最大的州,美国西部已经高度城市化了,但加利福尼亚州即使在那个地区也很特殊:91%的人口住在城市地区。然而,就地理分布而言,加利福尼亚州属于农村:96%的土地在城区外。如果上述为
以下属于战国时期法制指导思想和原则的有()
Whenateacher【B1】______astudenttoreadabookit’susuallyforaparticularpurpose.Thebookmay【B2】______usefulinformatio
A、Theytendtoputlotsofmake-upontheface.B、Theyeatmorecucumberseveryday.C、Theytendtotrynaturalvegetablesonth
最新回复
(
0
)