首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
LONDON—Security experts are warning that the global cyberattack that began on Friday is likely to be magnified in the new work
LONDON—Security experts are warning that the global cyberattack that began on Friday is likely to be magnified in the new work
admin
2022-01-20
123
问题
LONDON—Security experts are warning that the global cyberattack that began on Friday is likely to be magnified in the new workweek as users return to their offices and turn on their computers. Many workers, particularly in Asia, had already logged off on Friday when the malicious soft ware, stolen from the United States government, began proliferating across computer systems around the world. So the true impact of the attack may emerge on Monday as employees return and log in. Moreover, copycat variants of the malicious software behind the attacks are likely to spread, since the malware uses mostly open-source code and is easily replicable.
Rob Wainwright, the executive director of Europol, said on Sunday that the attacks had hit 200,000 computers in more than 150 countries. Among the organizations hit were FedEx in the United States, the Spanish telecom giant Telefonica, the French automaker Renault, universities in China, Germany’s federal railway system and Russia’s powerful Interior Ministry. The most disruptive attacks infected Britain’s public health system, where surgeries had to be rescheduled and some patients were turned away from emergency rooms. Nancy Harper, who went to the hospital for an X-ray, said: "It’s concerning that the N.H.S. was dependent on these outdated systems. If your average person has access to cheap cloud storage these days, then hospitals should be using similar backup methods. I hope this was a wake-up call."
"We could see more attacks if people start to copycat this attack," Matthieu Suiche added. A 22-year-old British researcher who uses the Twitter name Malware Tech has been credited with inadvertently helping to
stanch
the spread of the assault by identifying the web domain for the hackers’ "kill switch"—a way of disabling the malware.
Governments around the world were bracing themselves for the start of the workweek. "This is crucial for businesses when reopening on Monday: Please be aware and anticipate, and take preventive steps against the Wanna Cry malware attack," Indonesia’s communication and information minister, Rudiantara, who like many Indonesians uses only one name, said at a news conference. He advised those hit by the malware against paying the $300 to $600 in Bitcoin demanded as ransom to regain access to encrypted data, since there was no assurance that the extortionists would decrypt the files as promised.
According to Paragraph 1, which of the following about malicious software is NOT true?
选项
A、It comes from the United States government.
B、When it is released, the true impact of attack emerges immediately.
C、The reproductive variants of it are likely to transmit.
D、It is easily copied.
答案
B
解析
细节题。根据题干关键词定位到文章第一段。A项与原文stolen from the United States government一致。C、D两项中关键词reproductive variants,transmit和copied可在该段最后一句Moreover,copycat variants of the malicious software behind the attacks are likely to spread,since the malware uses mostly open source code and is easily replicable中找到相关信息,其中transmit(传播),copied(复制)分别是该句中spread和replicable的同义替换。B项“恶意软件从互联网上释放出来时,这次攻击的真正影响就会立即表现出来”,根据选项关键词true impact可定位到第三句So the true impact of the attack may emerge on Monday as employees return and log in,即“也许到员工周一上班、登录计算机时这次攻击的真正影响才会表现出来”,因此B项表述错误。故本题选B。
转载请注明原文地址:https://kaotiyun.com/show/Mbi4777K
0
考研英语二
相关试题推荐
Excitement,fatigue,andanxietycanallbedetectedfromsomeone’sblinks,accordingtopsychologistJohnStern(21)Washington
Theconference______thepossibilityofestablishingcloserdiplomaticrelationshipbetweenthetwocountries.
Youwouldbe______arisktoletyourchildgotoschoolbyhimself.
Thelongestbullruninacenturyofart-markethistoryendedonadramaticnotewithasaleof56worksbyDamienHirst,Beauti
Thelongestbullruninacenturyofart-markethistoryendedonadramaticnotewithasaleof56worksbyDamienHirst,Beauti
Itlookedjustlikeanotheraircraftfromtheoutside.Thepilottoldhisyoungpassengersthatitwasbuiltin1964.Butappear
TheUnitedStateshashistoricallyhadhigherratesofmarriagethanthoseofotherindustrializedcountries.Thecurrentannual
Youreadajobrecruitmentonanewspaperaboutapositionofaneditor.Writealettertoapplyforthisvacancy.Introduceyou
Theterm"Followyourpassion"hasincreasedninefoldinEnglishbookssince1990."Findsomethingyoulovetodoandyou’llnev
Thebattletopreventoratleastslowglobalwarminghasintensifiedinthepastyearasscientistshavelearnedmoreaboutthe
随机试题
赵某在A市第三人民医院就诊,在手术过程中大出血,最后落下了后遗症。赵某认为医院在手术中出现了失误,遂起诉医院要求赔偿。在诉讼举证期间,赵某称,根据手术前后的记录可知,院方存在医疗过错,而被告第三人民医院则辩称由于涉及医院内部程序,手术的记录不能提供给法庭参
试述土工织物有效孔径的试验步骤。
项目经济评价采用()方法进行资金等值变换。
刊登在外管局网站的新闻稿称,中国外汇储备的货币结构不是一成不变的,而是动态调整优化。目前外汇储备中有美元、欧元、日圆等主要货币,也有新兴市场国家货币。另外,外管局并指出,中国外汇储备规模很大,提高信息透明度必须慎重、稳步,不能操之过急。据中国人民银行发布数
在教育方法上,人本主义学派主张()
甜蜜的嗓音、温暖的色彩这种感觉现象是()。(统考2011研)
某公安局的刑侦员甲、乙、丙、丁通过广泛地调查取证,对X案的嫌疑犯李、赵作了如下断定:甲:我认为赵不是凶犯。乙:或者李是凶犯,或者赵是凶犯。丙:如果李是凶犯,则赵不是凶犯。丁:我看李和赵都是凶犯。事后证明,这
Thispassagechieflydiscusses______.WhichofthefollowingstatementsisNOTtrue?
下面是关于ARM7嵌入式处理器芯片的叙述:I.ARM7芯片内部包括外部存储器管理部件Ⅱ.ARM7芯片内部包括片内存储器及其控制器Ⅲ.ARM7芯片内部包括中断控制器Ⅳ.ARM7芯片内部包括DMA控制器其中,正确的是()。
ThefollowingisaJobAdvertisement.Afterreadingit,youshouldgivebriefanswerstothe5questions(No.56throughNo.60)
最新回复
(
0
)