刷题刷出新高度,偷偷领先!偷偷领先!偷偷领先! 关注我们,悄悄成为最优秀的自己!

单选题

请作答74题, Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an 

(71 ) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (72) . Upon running, such worms usually proceed to send themselves out to email addresses from the victim's address book, previous emails, web pages  (73) . 

As administrators seek to block dangerous email attachments through the recognition of well-known (74) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users. 

Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the  (75) access to your network. 

A
names     
B
cookies 
C
software
D
extensions 
使用微信搜索喵呜刷题,轻松应对考试!

答案:

D

解析:

根据句子Melissa and LoveLetter利用存在的朋友或同事间的信任以及后文描述病毒作者使用其他扩展名来绕过此类保护,可知此处指的是电子邮件附件的扩展名,故选D。

创作类型:
原创

本文链接:请作答74题, Melissa and LoveLetter made use of the tru

版权声明:本站点所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议。转载请注明文章出处。

让学习像火箭一样快速,微信扫码,获取考试解析、体验刷题服务,开启你的学习加速器!

分享考题
share