首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
SAN FRANCISCO—The attack had the hallmarks of something researchers had dreaded for years: malicious software using artificial i
SAN FRANCISCO—The attack had the hallmarks of something researchers had dreaded for years: malicious software using artificial i
admin
2019-11-20
129
问题
SAN FRANCISCO—The attack had the hallmarks of something researchers had dreaded for years: malicious software using artificial intelligence that could lead to a new digital arms race in which A.I.-driven defenses battled A.I.-driven offenses while humans watched from the sidelines.
But what was not as widely predicted was that one of the earliest instances of that sort of mal-ware was found in India, not in a sophisticated British banking system or a government network in the United States. As India rushes to go online, it provides a fertile testing ground for hackers trying their skills in an environment where they can evade detection before deploying them against a company or state that has more advanced defenses. The cyberattack in India used malware that could learn as it was spreading, and altered its methods to stay in the system for as long as possible. Those were "early indicators" of A.I., according to the cybersecurity company Darktrace. Essentially, the malware could figure out its surroundings and mimic the behavior of the system’s users, though Darktrace said the firm had found the program before it could do any damage.
At times, these attacks are simply targeting more susceptible victims. While companies in the United States will often employ half a dozen security firms’ products as defensive measures, a similar company elsewhere may have just one line of defense—if any. In the case of attacks carried out by a nation-state, companies in the United States can hope to receive a warning or assistance from the federal government, while companies elsewhere will often be left to fend for themselves.
Cybersecurity experts now speculate that a February 2016 attack on the central bank of Bangladesh was a precursor to similar attacks on banks in Vietnam and Ecuador. That hackers managed to steal $81 million from the Bangladesh Bank generated headlines because of the size of the heist. But what interested cybersecurity experts was that attackers had taken advantage of a previously unexplored weakness in the bank’ s computers by undermining its accounts on Swift, the international money transfer system that banks use to move billions of dollars among themselves each day.
The following are the characteristics of malware used in cyberattack in India EXCEPT that______.
选项
A、it is not a full-fledged A.I.-driven piece of software
B、it can copy the action of the users to blend in
C、it can learn while it was in the system
D、it changes ways to remain undetected for as long as possible
答案
A
解析
细节题。根据题干关键词定位到文章第二段。B项“模仿用户的行为以蒙混过关”与第二段末句中…mimic the behavior of the system’s users表述一致,其中B项中的copy是mimic的同义替换。C项“侵入系统后进行了自我学习”和D项“改变方法让自己尽可能长时间地不被发现”可从…could learn as it was spreading,and altered its methods to stay in the system for as long as possible中找到相关信息。A项“一个不完全由人工智能主导的软件”并未在原文中提及,故本题选A。
转载请注明原文地址:https://kaotiyun.com/show/8Ze4777K
0
考研英语二
相关试题推荐
ThewriterwarnsAmericansthat______.By"commonresources"(Paragraph2),theauthormeansthat______.
Immediatesolutionshouldbe______tosavethepeoplefromthefloodthathassweptsouthernChinathissummer.
Accordingtothepassage,thefactthatyoungpeopleseemtobelosinginterestinscience______.Theword"disparity"(Paragr
Amajorreasonforconflictintheanimalworldisterritory.Themaleanimal(21)anarea.Thesizeoftheareaissufficientt
A.TheconsequenceoflosingbonesB.AbetterlabthanonearthC.TwodifferentcasesD.Multipleeffectsformwei
Thequestioningoftheroleofthepubliegalleryisnotanewphenomenon.Itissomethingthathasbeenarguedoversinceitsv
Thequestioningoftheroleofthepubliegalleryisnotanewphenomenon.Itissomethingthathasbeenarguedoversinceitsv
Beautyhasalwaysbeenregardedassomethingpraiseworthy.Almosteveryonethinksattractivepeoplearehappierandhealthier,h
Beautyhasalwaysbeenregardedassomethingpraiseworthy.Almosteveryonethinksattractivepeoplearehappierandhealthier,h
随机试题
李某与王某签订了一个买卖一头耕牛的合同,约定由买受人王某在水田试用3天。根据已知的条件,下列观点正确的是()。
CT与X线照片比较,X线照片不易显示的病变是
患者,女,20岁。哮喘复发3天,有8年哮喘史,伴有轻度咳嗽,痰显泡沫状,量不多,诊断,支气管哮喘。哮喘急性发作的首选药是()。
关于社会主义法治理念及其特征的表述,下列哪一选项是错误的?()(司考.2010.1.5)
在未碾压成型的沥青路面上,压路机不得进行()。
某小企业采用《小企业会计制度》,10月31日相关账户的余额如下(单位:万元):根据以上资料,回答问题:结转本月销售产品的实际生产成本36万元,应编制的会计分录为()。
以下属于管理岗位培训规范内容的是()。
中等收入陷阱指一个国家(由于某种优势)达到了一定收入水平,将停留在这个水平的情况。这个问题通常发生在发展中经济体发现自己卡在劳动力成本上涨和成本竞争力下降的中间,无法与高技能创新的先进经济体,或低收入低工资的经济体在制成品的廉价生产上相竞争。根据上述定义,
党的十九大提出实施乡村振兴战略,是以习近平同志为核心的党中央着眼党和国家事业全局,深刻把握现代化建设规律和城乡关系变化特征,顺应亿万农民对美好生活的向往,对“三农”工作作出的重大决策部署,是新时代做好“三农”工作的总抓手。实施乡村振兴战略的根本目的是
FinallythedirtroadinMainewasleadinghome.Thetiretouchedthefirstprofanityofpavement,andsubtlymyvacationbegan
最新回复
(
0
)