刷题刷出新高度,偷偷领先!偷偷领先!偷偷领先! 关注我们,悄悄成为最优秀的自己!

单选题

请作答74题。Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine receiving an  (71)  from a friend who asks you to open it. This is what happens with Melissa and several other similar email  (72) . Upon running, such worms usually proceed to send themselves out to email addresses from the victim's address book, previous emails, web pages  (73) .

As administrators seek to block dangerous email attachments through the recognition of well-known  (74) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.

Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the  (75)  access to your network.

A
names        
B
cookies        
C
software        
D
extensions 
使用微信搜索喵呜刷题,轻松应对考试!

答案:

D

解析:

根据题目描述,Melissa和其他类似的电子邮件蠕虫利用附件来传播病毒,这些附件在运行时会从受害者的地址簿、以前的电子邮件、Web页面缓存区等地方获取邮件地址并发送病毒。管理人员试图通过识别已知的扩展名来阻止危险的电子邮件附件,而病毒作者则使用其他扩展名来绕过这种保护。因此,根据上下文推断,空格处应填写与电子邮件附件的扩展名相关的选项,而D选项“extensions”符合题意。

创作类型:
原创

本文链接:请作答74题。Melissa and LoveLetter made use of the trus

版权声明:本站点所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议。转载请注明文章出处。

让学习像火箭一样快速,微信扫码,获取考试解析、体验刷题服务,开启你的学习加速器!

分享考题
share