刷题刷出新高度,偷偷领先!偷偷领先!偷偷领先! 关注我们,悄悄成为最优秀的自己!

单选题

请作答71题。Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an  (71)  from a friend who asks you to open it. This is what happens with Melissa and several other similar email  (72) . Upon running, such worms usually proceed to send themselves out to email addresses from the victim's address book, previous emails, web pages  (73) .

As administrators seek to block dangerous email attachments through the recognition of well-known  (74) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.

Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the  (75)  access to your network.

A
attachment      
B
packet 
C
datagram    
D
message
使用微信搜索喵呜刷题,轻松应对考试!

答案:

A

解析:

根据题目描述,Melissa和LoveLetter利用了朋友和同事之间的信任,通过电子邮件附件传播病毒。题目中提到收到一个来自朋友的邮件,要求打开附件,因此选项D的message(消息)最符合语境。其他选项如attachment(附件)、packet(数据包)、datagram(数据报)都与电子邮件附件相关,但不完全符合题目描述。

创作类型:
原创

本文链接:请作答71题。Melissa and LoveLetter made use of the trus

版权声明:本站点所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议。转载请注明文章出处。

让学习像火箭一样快速,微信扫码,获取考试解析、体验刷题服务,开启你的学习加速器!

分享考题
share