刷题刷出新高度,偷偷领先!偷偷领先!偷偷领先! 关注我们,悄悄成为最优秀的自己!

单选题

请作答73题。Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an  (71)  from a friend who asks you to open it. This is what happens with Melissa and several other similar email  (72) . Upon running, such worms usually proceed to send themselves out to email addresses from the victim's address book, previous emails, web pages  (73) .

As administrators seek to block dangerous email attachments through the recognition of well-known  (74) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.

Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the  (75)  access to your network.

A
memory    
B
caches
C
ports     
D
registers 
使用微信搜索喵呜刷题,轻松应对考试!

答案:

B

解析:

根据题目描述,Melissa和其他类似的电子邮件蠕虫会从受害者的地址簿、以前的电子邮件以及Web页面缓存区等地方获取邮件地址并发送出去。因此,正确答案是B,即缓存区(caches)。

创作类型:
原创

本文链接:请作答73题。Melissa and LoveLetter made use of the trus

版权声明:本站点所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议。转载请注明文章出处。

让学习像火箭一样快速,微信扫码,获取考试解析、体验刷题服务,开启你的学习加速器!

分享考题
share