组卷题库 > 高中英语试卷库
试题详情
阅读下面短文,从每题所给的 A、B、C、D 四个选项中选出可以填入空白处的最佳选项。

How to recognize cyber attacks

Cyber-attacks may sound like something that happens only in Hollywood movies. You1a team of talented Hackers gathered around computer monitors trying to break into a secure bank or government server. In reality, cyber-attacks are much less exciting but no less2.

A/An3attack involves a cyber-criminal sending out thousands or oven millions of links and flies. They assume that someone will4fall for their trap and open an infected file or page. Somebody always does. The best way to protect yourself is to learn how to5cyber-attacks as well as how to prevent them from happening in the first place.

Cyber-attacks can happen to anybody. It doesn't matter who you are; cyber criminals can target you. While many often think of hacking victims as6about digital security best practices, this isn't always the case. Kickers are smart. True, there are plenty of apparent scams (骗局) like 'the Nigerian Prince" emails. But there are as many attacks that can fool even the skillful computer-users.

Nowadays, cyber-criminals create fake websites and email addresses. You may think you are clicking a link to Dropbox (多宝箱) only to download malware onto your computer,7may never know when you have visited the wrong site and downloaded a/an8file. So, it's up to you to be vigilant and protect yourself.

So you need to lean to recognize the signs of cyber-attacks. First, recognize9activity on your accounts or devices.10some things may be obvious such as account password changes, others aren't so easy to spot. Usually, hackers insert pieces of code into valid files and programs. And then, you might receive a file from a trusted sender whose mail has been11. Sometimes, the data are even real, but the hacker may have inserted a few lines of code that can also infect your computer. You should take the time to check your "Task Manager" to get a sense of what12are running. Check anything suspicious that's13in the background. That's often the sign of malware.

Other things to14for include: random device or internet slowdown; the software you don't recognize; inability to access your account or unscheduled shutdowns and restarts.

As with everything,15is the best medicine. So, instead of waiting for cyber-attacks to hit you, recognize the signs to protect yourself.

知识点
参考答案
采纳过本试题的试卷
教育网站链接