首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
LONDON—Security experts are warning that the global cyberattack that began on Friday is likely to be magnified in the new work
LONDON—Security experts are warning that the global cyberattack that began on Friday is likely to be magnified in the new work
admin
2022-01-20
109
问题
LONDON—Security experts are warning that the global cyberattack that began on Friday is likely to be magnified in the new workweek as users return to their offices and turn on their computers. Many workers, particularly in Asia, had already logged off on Friday when the malicious soft ware, stolen from the United States government, began proliferating across computer systems around the world. So the true impact of the attack may emerge on Monday as employees return and log in. Moreover, copycat variants of the malicious software behind the attacks are likely to spread, since the malware uses mostly open-source code and is easily replicable.
Rob Wainwright, the executive director of Europol, said on Sunday that the attacks had hit 200,000 computers in more than 150 countries. Among the organizations hit were FedEx in the United States, the Spanish telecom giant Telefonica, the French automaker Renault, universities in China, Germany’s federal railway system and Russia’s powerful Interior Ministry. The most disruptive attacks infected Britain’s public health system, where surgeries had to be rescheduled and some patients were turned away from emergency rooms. Nancy Harper, who went to the hospital for an X-ray, said: "It’s concerning that the N.H.S. was dependent on these outdated systems. If your average person has access to cheap cloud storage these days, then hospitals should be using similar backup methods. I hope this was a wake-up call."
"We could see more attacks if people start to copycat this attack," Matthieu Suiche added. A 22-year-old British researcher who uses the Twitter name Malware Tech has been credited with inadvertently helping to
stanch
the spread of the assault by identifying the web domain for the hackers’ "kill switch"—a way of disabling the malware.
Governments around the world were bracing themselves for the start of the workweek. "This is crucial for businesses when reopening on Monday: Please be aware and anticipate, and take preventive steps against the Wanna Cry malware attack," Indonesia’s communication and information minister, Rudiantara, who like many Indonesians uses only one name, said at a news conference. He advised those hit by the malware against paying the $300 to $600 in Bitcoin demanded as ransom to regain access to encrypted data, since there was no assurance that the extortionists would decrypt the files as promised.
Among the following organizations, ________is seriously damaged.
选项
A、the French automaker Renault
B、Germany’ s federal railway system
C、Britain’ s public health system
D、the Spanish telecom giant Telefonica
答案
C
解析
细节题。根据题干关键词定位到文章第二段第三句The most disruptive attacks infected Britain’s public health system。其中,题干关键词seriously damaged是the most disruptive attacks的同义转换,故选C。由第二段第二句可知,法国汽车制造商雷诺、德国的联邦铁路系统、西班牙的电信巨头Telef6nica都受到了相应的攻击,但并没有表明其所受攻击的危害程度,A、B、D三项排除。故本题选C。
转载请注明原文地址:https://kaotiyun.com/show/gbi4777K
0
考研英语二
相关试题推荐
Theconference______thepossibilityofestablishingcloserdiplomaticrelationshipbetweenthetwocountries.
YouhavejustcomebackfromtheU.S.asamemberofaSino-Americanculturalexchangeprogram.WritealettertoyourAmerican
TheoutbreakofswinefluthatwasfirstdetectedinMexicowasdeclaredaglobalepidemiconJune11,2009.Itisthefirstworld
TheoutbreakofswinefluthatwasfirstdetectedinMexicowasdeclaredaglobalepidemiconJune11,2009.Itisthefirstworld
A.TheconsequenceoflosingbonesB.AbetterlabthanonearthC.TwodifferentcasesD.Multipleeffectsformwei
A.TheconsequenceoflosingbonesB.AbetterlabthanonearthC.TwodifferentcasesD.Multipleeffectsformwei
TheUnitedStateshashistoricallyhadhigherratesofmarriagethanthoseofotherindustrializedcountries.Thecurrentannual
TheUnitedStateshashistoricallyhadhigherratesofmarriagethanthoseofotherindustrializedcountries.Thecurrentannual
Prettyinpink:adultwomendonotrememberbeingsoobsessedwiththecolour,yetitispervasiveinouryounggirls’lives.It
Whatmakesagreathighschool?Americansthinkalotofthingsdo,fromoutstandingacademicsorasupportiveenvironmentfors
随机试题
运用计划评审技术包括哪几个基本步骤?
标志和谈之门被国民党全部关闭、国共关系彻底破裂的是()
患者男,59岁。声嘶伴咽部不适半年,痰中带血1个月。查体:甲状软骨膨大,右上颈部(Ⅱ区)可及大小约2cm×2.5cm质韧固定包块,无压痛。既往否认结核病史。患者行颈部MRI提示肿瘤位于声门上区,并侵及会厌前间隙、左侧咽壁、会厌及甲状软骨,左侧声带固定,口咽
国家最高权力机关将本应由它制定的某一方面法律的立法权,授予国家最高行政机关即国务院行使,此种立法是()。
上述报关活动中涉及的各家企业,属于报关活动相关人的是()。在加工过程中产生的边角料,企业可以按照()处理。
下列关于耕地占用税的表述中,不正确的是()。
2015年,吴锦泉、张宝艳、秦艳友、郎平、屠呦呦、阎肃、徐立平、莫振高、官东、买买提江.吾买尔、王宽等人被评为感动中国10大人物,在这10位当中,让你印象最深的人是谁?为什么?
【说明】某大型企业的数据中心为了集中管理、控制用户对数据的访问并支持大量的连接需求,欲构建数据管理中间件,其主要功能如下:(1)数据管理员可通过中间件进行用户管理、操作管理和权限管理。用户管理维护用户信息,用户信息(用户名、密码)存储在
不允许出现重复字段值的索引是( )。
在标准ASCII码表中,已知英文字母I的ASCII码是01001001,英文字母F的ASCII码是
最新回复
(
0
)