刷题刷出新高度,偷偷领先!偷偷领先!偷偷领先! 关注我们,悄悄成为最优秀的自己!

单选题

请作答73题,Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an 

(71 ) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (72) . Upon running, such worms usually proceed to send themselves out to email addresses from the victim's address book, previous emails, web pages  (73) . 

As administrators seek to block dangerous email attachments through the recognition of well-known (74) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users. 

Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the  (75) access to your network. 

A
memory     
B
caches   
C
ports 
D
registers 
使用微信搜索喵呜刷题,轻松应对考试!

答案:

B

解析:

根据题目描述,Melissa和LoveLetter利用了朋友或同事之间的信任关系来传播病毒。当收到一封来自朋友的邮件并请求打开时,这就是Melissa和其他类似的电子邮件病毒的做法。在运行时,这些病毒通常会继续向受害者的地址簿中的电子邮件地址发送自己,同时还会向以前的电子邮件和网页发送。因此,正确答案是B,即缓存(caches)。病毒通过缓存来传播自身,以感染目标用户。

创作类型:
原创

本文链接:请作答73题,Melissa and LoveLetter made use of the trus

版权声明:本站点所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议。转载请注明文章出处。

让学习像火箭一样快速,微信扫码,获取考试解析、体验刷题服务,开启你的学习加速器!

分享考题
share