首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Hackers Attack US State Department Computers The U. S. State Department has closed its public email system and websites after
Hackers Attack US State Department Computers The U. S. State Department has closed its public email system and websites after
admin
2018-06-10
111
问题
Hackers Attack US State Department Computers
The U. S. State Department has closed its public email system and websites after a suspected attack by 【L1】______called "hackers. " It had never been 【L2】______before.
A senior official told 【L3】______on Sunday that only the 【L4】______email system and websites were affected. The affected email system was not used to 【L5】______.
Workers are now repairing the damage caused by the hackers and are 【L6】______of the system. The repairs should be finished 【L7】______. The State Department plans to talk about the attack when 【L8】______.
According to the official, the State Department 【L9】______ " activity of concern" 【L10】______. It was around the same time hackers tried to 【L11】______the White House computer network. At that time, it appeared that the State Department computers 【L12】______. And there was 【L13】______that the two hacking attempts were related.
Last month, hackers gained access to an unclassified 【L14】______at the White House and did not 【L15】______the part that holds secret information. Two other U. S. 【L16】______, the U.S. Postal Service and the 【L17】______, also reported attacks on their computer systems.
【L18】______is difficult. Hackers often take control of 【L19】______around the world and then 【L20】______through those systems.
【L19】
Hackers Attack US State Department Computers
The U. S. State Department has closed its public email system and websites after a suspected attack by computer criminals called "hackers. " It had never been shut down before.
A senior official told the Associated Press on Sunday that only the unclassified email system and websites were affected. The affected email system was not used to send secret communications.
Workers are now repairing the damage caused by the hackers and are improving the security of the system. The repairs should be finished Monday or Tuesday. The State Department plans to talk about the attack when the repairs are completed.
According to the official, the State Department detected " activity of concern" last October. It was around the same time hackers tried to gain access to the White House computer network. At that time, it appeared that the State Department computers were not affected. And there was no indication that the two hacking attempts were related.
Last month, hackers gained access to an unclassified computer system at the White House and did not get through the part that holds secret information. Two other U. S. government agencies, the U. S. Postal Service and the National Weather Service, also reported attacks on their computer systems.
Identifying the hackers is difficult. Hackers often take control of computer networks around the world and then launch their attacks through those systems.
选项
答案
computer networks
解析
转载请注明原文地址:https://kaotiyun.com/show/vUrO777K
本试题收录于:
CATTI三级口译综合能力题库翻译专业资格(CATTI)分类
0
CATTI三级口译综合能力
翻译专业资格(CATTI)
相关试题推荐
TheBeatles甲壳虫乐队TheEnglishrockmusicgroupTheBeatlesgavethe1960sitscharacteristicmusicalflavorand(1)aprofoun
AsurveyhasshownthatAmericansbelieveKansasis______visitedbyforeigntouriststhanotherstates.
Government政府Governmentisthepoliticalsystembywhicha(1)orcommunityisadministeredandregulated.Mostof(2)k
Havingbeenrobbedofeconomicimportance,thosestatesarenotlikelytocountonverymuchininternationalpoliticalterms.
With2005fastbecoming"theyearofthenaturaldisaster",itistimetoreflectonhowengineering,scienceandtechnologyca
ThedenseBelgianfogsiscausedbythecoolingofhumidsurfaceairtoarelativelylowtemperature.
Assumingthattheengineeringproblemscouldbeovercome,theproductionofatimemachinecouldopenupaPandora’sboxofcaus
Ifyouleftyourbookonthetableovernight,youwouldfindthefollowingmorningthatitwasstillexactlywhereyouhadleft
Ifyouleftyourbookonthetableovernight,youwouldfindthefollowingmorningthatitwasstillexactlywhereyouhadleft
Thehard,outsurfaceofthetoothiscalledenamel.
随机试题
子痫前期不主张应用扩容剂,仅用于伴严重低蛋白血症、贫血时。()
急性肾衰竭患者可选择的抗生素是
小王、小李和小马共同毕业于某名牌大学的人力资源管理专业,毕业后,他们一同被一家外资企业聘用。小王喜欢观察学习、研究、分析、评估和解决问题;小李刚喜欢和人互动,自信,有支配能力,追求权力和地位;而小马喜欢从事资料工作,有协作或数理分析能力,能够听从指示完成琐
强调引导儿童从原有的知识经验中“生长”出新的知识经验,持这种基本观点的学习理论是()。
在()世纪的骑士教育中,骑士七艺(骑马、游泳、投枪、击剑、狩猎、下棋和吟诗)的内容和形式.与现代体育已十分相似。
张某触犯了法定最高获刑为5年有期徒刑的罪名,则追诉时效为()。
中国咏花诗词的历史认识价值和艺术审美价值是不容忽视的。它通过人们对花卉的审美态度和欣赏情调,曲折地反映了人的种种处境和对生活的理解。我们在阅读鉴赏咏花诗词的同时,考虑历代诗人、词人的不同的创作心态以及与之相适应的艺术境界,是很有趣味的,这对我们的鉴赏活动也
根据原始数据来源分类,入侵检测系统可分为()。
在软件开发过程中,软件结构设计是描述______。
A、Applepies.B、Sandwiches.C、Scones.D、Cakes.AAccordingtothewaitresswhohasbeenservingDonandTurner,theyhavehadcom
最新回复
(
0
)