首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
[A] Anti-virus software often bounces a warning back to the sender of an infected e-mail, saying that the e-mail in question can
[A] Anti-virus software often bounces a warning back to the sender of an infected e-mail, saying that the e-mail in question can
admin
2011-02-25
66
问题
[A] Anti-virus software often bounces a warning back to the sender of an infected e-mail, saying that the e-mail in question cannot be delivered because it contains a virus. SoBig. F was able to spoof this system by" harvesting" e-mail addresses from the hard disks of infected computers. Some of these addresses were then sent infected e-mails that had been doctored to look as though they had come from other harvested addresses. The latter were thus sent warnings, even though their machines may not have been infected.
[B] Blaster worked by creating a "buffer overrun in the remote procedure call". In English, that earns it attacked a piece of software used by Microsoft’s Windows operating system to allow one computer to control another. It did so by causing that software to use too much memory.
[C] Though both of these programs fell short of the apparent objectives of their authors, they still caused damage. For instance, they forced the shutdown of a number of computer networks, including the one used by the New York Times newsroom, and the one organizing trains operated by CSX, a freight company on America’s east coast. Computer scientists expect that it is only a matter of time before a truly devastating virus is unleashed.
[D] Most worms work by exploiting weaknesses in an operating system, but whoever wrote Blaster had a particularly refined sense of humour, since the website under attack was the one from which users could obtain a program to fix the very weakness in Windows that the worm itself was exploiting.
[E] One way to deal with a wicked worm like Blaster is to design a fairy godmother worm that goes around repairing vulnerable machines automatically. In the case of Blaster someone seems to have tried exactly that with a program called Welchi. However, according to Mr. Haley, Welchi has caused almost as many problems as Blaster itself, by overwhelming networks with "pings" signals that checked for the presence of other computers.
[F] SoBig. F was the more visible of the two recent waves of infection because it propagated itself by e-mail, meaning that victims noticed what was going on. SoBig. F was so effective that it caused substantial disruption even to those protected by anti-virus software. That was because so many copies of the virus spread (some 500,000 computers were infected) that many machines were overwhelmed by messages from their own anti-virus software. On top of that, one common counter-measure backfired, increasing traffic still further.
[G] Kevin Haley of Symantec, a firm that makes anti-virus software, thinks that one reason SoBig. F was so much more effective than other viruses that work this way is because it was better at searching hard-drives for addresses. Brian King, of CERT, an internet-security centre at Carnegie-Mellon University in Pittsburgh, notes that, unlike its precursors, SoBig. F was capable of "multi-threading": it could send multiple e-mails simultaneously, allowing it to dispatch thousands in minutes.
选项
答案
E
解析
根据前段论述可知。
转载请注明原文地址:https://kaotiyun.com/show/ezp4777K
0
考研英语一
相关试题推荐
Withthedevelopmentoftheglobaleconomy,manycompaniesstatetheirbasicobjectiveofengaginginaworldwidemanufacturing
Theauthor’sattitudetowardsthecurrentsituationintheexploitationofnaturalresourcesis______Itcanbeinferredfromt
Whichofthefollowingbeststatesthemainpointofthepassage?______Whichofthefollowingdoestheauthormentionasacha
Whichofthefollowingbeststatesthemainpointofthepassage?______Itcanbeinferredfromthepassagethatonewayinwhi
WhydidtheJapanesestaffcomplaintotheAmericanmanager?TheauthorgivesadetailedexplanationoftheexamplesoftheAsi
Ah,blissfulsleep,whenweleaveourdailytoilsbehindandslipintomindlessrepose.Ordowe?(46)TworeportsinScience,on
Thediscoveryoftheshipisimportanttostudentsofearlyshipsandtheirroutesbecause______.Archaeologistswereableto
China’sentryintotheWTOactuallyrepresentstheresultofathree-sidedwin-winsituation-China,theUnitedStatesandthe
ItisimpossibletomeasuretheimportanceofEdisonbyaddingupthespecificinventionswithwhichhisnameisassociated.Far
Scholarsandstudentshavealwaysbeengreattravelers.Theofficialcasefor"academicmobility"isnowoftenstatedinimpress
随机试题
甲有限责任公司由三家法人股东组成,因经营不善,公司股东会决议进行公司改组,60%的优良资产被剥离出来组建另一家乙有限责任公司,不良资产留在甲公司:改组后,甲公司只能勉强维持,而乙公司则业务兴旺。公司改组前,甲公司曾为工商银行对某房地产公司的2000万元贷款
需补体参与的超敏反应有_________型和_________型。
男,33岁。15年前曾发现蛋白尿,一直未检查和治疗。三周前出现恶心、呕吐,查体:血压190/120mmHg,轻度浮肿,血肌酐360μmol/L,B超双肾缩小。下列检查项目中不应进行的是
阳水之风水泛滥证的治法是()
建筑物内部色彩主要看建筑物的色彩是否与建筑物的规模、环境及功能相适应。()
根据《招标投标法》规定,依法必须进行招标的项目,招标人应当确定中标人之日起15日内,向有关行政监督部门提交招标投标情况的书面报告,其书面报告中至少应包括()等内容。
申请进口废物的企业必须满足2个标准。( )
教师通过创设良好的环境和自身的教育因素,对学生进行熏陶和感染以培养学生良好思想品德的德育方法是()。
A、选择B、投影C、自然连接D、并A由关系R到关系S为一元运算,排除C和D。关系S是关系R的一部分,是通过选择之后的结果,因此选A。
DoBritain’sEnergyFirmsServethePublicInterest?[A]Capitalismisthebestandworstofsystems.Lefttoitself,itwillemb
最新回复
(
0
)