首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
A、How to safeguard the computer network. B、How to steal top secret files from a military base. C、How to make modern devices broa
A、How to safeguard the computer network. B、How to steal top secret files from a military base. C、How to make modern devices broa
admin
2017-04-29
47
问题
Imagine hackers stealing top secret files from a military base. What if they don’t need the Internet to pull data out of the facility’s computers? Instead, they can just infect an office printer and—with software alone— turn it into a radio. This sounds like sci-fi, but it’s now possible.(9)Security researchers at a Manhattan startup have discovered how to make any modern device—printer, washing machine, air conditioner— broadcast invisible, inaudible signals for miles. That’s a game changer and a huge step forward for hackers.
The rapidly expanding $77 billion cybersecurity industry is all about guarding computer networks. Companies and governments buy products to stay protected. But they keep running out of effective defensive options. That’s where Ang Cui and his team of bright researchers come in. They found a way to sneak data out of a computer network without setting off any alarms.(10)It’s groundbreaking research, because it also hints at the ability to steal data from computers that aren’t even connected to the Internet, like those at nuclear facilities.
Last week, the team at Red Balloon Security demonstrated how it works to several news reporters. They infected a Pantum laser printer and toyed with its circuits, making it do something it was never meant to. By quickly switching a chip’s energy output back and forth, the printer emits electromagnetic radiation. The Red Balloon team calls it a "funtenna. "(11)In fact, one of the only ways to detect this highly advanced tactic is by walking around with an AM radio. If you get near a device and the radio static is interrupted by loud beeping, it’s secretly transmitting radio signals.
Questions 9 to 11 are based on the passage you have just heard.
9. What did the security researchers at a Manhattan startup discover?
10. Why is the new hacking tactic groundbreaking?
11. How to prevent the highly advanced tactic stealing data from computers?
选项
A、How to safeguard the computer network.
B、How to steal top secret files from a military base.
C、How to make modern devices broadcast invisible, inaudible signals.
D、How to use an FM radio to detect the invisible, inaudible signals.
答案
C
解析
转载请注明原文地址:https://kaotiyun.com/show/YDU7777K
0
大学英语六级
相关试题推荐
A、Becauseshefeelsveryhotintheroom.B、Becauseshewantstoavoidmeetingpeople.C、Becauseshewantstosmokeacigarette
EdgarPoe,anAmericanwriter,wasbornin1809.Hisparentswereactors.Edgarwasababywhenhisfatherleftthefamily.Hew
A、Becausehewassued.B、Becausehegaveuphistrademarkrights.C、BecausehesoldthecompanytotheShanbyGroup.D、Becauseh
A、Becausetheyweredrivenbysteampower.B、Becausetheydidtheworkanimalsusedtodo.C、Becausetheypulledcarsfullofco
Forcenturiesmendreamedofachievingverticalflight.In400A.D.Chinesechildrenplayedwithafan-liketoythatspunupward
Forcenturiesmendreamedofachievingverticalflight.In400A.D.Chinesechildrenplayedwithafan-liketoythatspunupward
A、Itencouragedpeopletoinvent.B、Itprotectedpeople’sinvention.C、Itpublicizedideasthatmightbekeptastradesecrets.
A、Inordertolocatethesunandstars.B、Incaseofgettinglostafterleavingaknownlandmark.C、Inordertoavoidtheassau
A、Itmeansgettingtoofat.B、It’sakindofheartdisease.C、It’sthebiggestkillerinAmerica.D、It’saresultoftoomuchst
随机试题
建筑施工企业项目经理是指受企业法定代表人委托对()全面负责的项目管理者。
发行人在确定债券期限时,要考虑的影响因素主要有()。
从银行外汇交易的角度,银行有买入价、卖出价和中间价,如果某国银行间外汇交易市场上外汇买入价高于卖出价,则说明该国采用的汇率算价方法是()。
关于转让定价的税制陈述,下列正确的有()。
()是与学科课程对立的课程类型。它以儿童从事某种活动的兴趣和动机为中心组织课程。
公安行政处罚的种类具体包括()
下列何种情形下,经警告无效,人民警察可以使用警棍、催泪弹、高压水枪等驱逐性、制服性的警械?()
“十三五”规划纲要指出,要深入贯彻习近平总书记系列重要讲话精神,坚持“四个全面”战略布局,坚持(),牢固树立和贯彻落实创新、协调、绿色、开放、共享的发展理念。
下面3个图分别表示两种生物种群随时间(t)推移而发生的数量(a)变化情况,则甲、乙、丙三图表示的关系最有可能依次是:
Whatisthepurposeofthebunchofmagicroots?Theracialprejudicethenarratorencounteredatthecollegeoratoricalcontes
最新回复
(
0
)