下载本文档
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、姓名:_ 班级:_ 学号:_-密-封 -线- 中级.软件设计师单项选择考试卷模拟考试题考试时间:120分钟 考试总分:100分题号一二三四五总分分数遵守考场纪律,维护知识尊严,杜绝违纪行为,确保考试结果公正。1、melissa and love letter made use of the trust that exists between friends or colleagues.imagine receiving an _(71)_from a friend who asks you to open it.this is what happens with melissa and sev
2、eral other similar email _(72)_.uponrunning ,such worms usually proceed to send themselves out to email addresses from the victims address book, previous emails, web pages_(73)_.as administrators seek to block dangerous email attachments through the recognition of well-known _(74)_,virus writers use
3、 other extensions to circumvent such protection.executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.frequently ,hackers try to penetrate networks by sending an attachment that looks like a flash movie ,whi
4、ch, while displaying some cute animation ,simultaneously runs commands in the background to steal your passwords and give the _(75)_access to your network.(71)处填( )a.attachmentb.packetc.datagramd.message2、melissa and love letter made use of the trust that exists between friends or colleagues.imagine
5、 receiving an _(71)_from a friend who asks you to open it.this is what happens with melissa and several other similar email _(72)_.uponrunning ,such worms usually proceed to send themselves out to email addresses from the victims address book, previous emails, web pages_(73)_.as administrators seek
6、to block dangerous email attachments through the recognition of well-known _(74)_,virus writers use other extensions to circumvent such protection.executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.freque
7、ntly ,hackers try to penetrate networks by sending an attachment that looks like a flash movie ,which, while displaying some cute animation ,simultaneously runs commands in the background to steal your passwords and give the _(75)_access to your network.(72)处填( )a.virtualb.virusc.wormsd.bacteria3、me
8、lissa and love letter made use of the trust that exists between friends or colleagues.imagine receiving an _(71)_from a friend who asks you to open it.this is what happens with melissa and several other similar email _(72)_.uponrunning ,such worms usually proceed to send themselves out to email addr
9、esses from the victims address book, previous emails, web pages_(73)_.as administrators seek to block dangerous email attachments through the recognition of well-known _(74)_,virus writers use other extensions to circumvent such protection.executable (.exe) files are renamed to .bat and .cmd plus a
10、whole list of other extensions and will still run and successfully infect target users.frequently ,hackers try to penetrate networks by sending an attachment that looks like a flash movie ,which, while displaying some cute animation ,simultaneously runs commands in the background to steal your passw
11、ords and give the _(75)_access to your network.(73)处填( )a.memoryb.cachesc.portsd.registers4、melissa and love letter made use of the trust that exists between friends or colleagues.imagine receiving an _(71)_from a friend who asks you to open it.this is what happens with melissa and several other sim
12、ilar email _(72)_.uponrunning ,such worms usually proceed to send themselves out to email addresses from the victims address book, previous emails, web pages_(73)_.as administrators seek to block dangerous email attachments through the recognition of well-known _(74)_,virus writers use other extensi
13、ons to circumvent such protection.executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.frequently ,hackers try to penetrate networks by sending an attachment that looks like a flash movie ,which, while disp
14、laying some cute animation ,simultaneously runs commands in the background to steal your passwords and give the _(75)_access to your network.(74)处填( )a.namesb.cookiesc.softwared.extensions5、melissa and love letter made use of the trust that exists between friends or colleagues.imagine receiving an _
15、(71)_from a friend who asks you to open it.this is what happens with melissa and several other similar email _(72)_.uponrunning ,such worms usually proceed to send themselves out to email addresses from the victims address book, previous emails, web pages_(73)_.as administrators seek to block danger
16、ous email attachments through the recognition of well-known _(74)_,virus writers use other extensions to circumvent such protection.executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.frequently ,hackers try to penetrate networks by sending an at
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 《梳理在线学习路径》教学课件-2025-2026学年川教版(新教材)小学信息技术三年级下册
- 交通安全评价体系
- 地铁运营安全评估标准
- 长途客运车辆轮胎安全检测(课件)
- 某麻纺厂安全生产操作规程
- AI在森林资源保护与管理中的应用
- 某电子厂产品包装与运输细则
- AI在机械工程中的应用
- 2026年区域技术市场协同发展:机制创新、成果转化与高质量发展路径
- 仓库管理人员安全培训考试题含答案
- 老旧供水设施改造项目可行性研究报告
- 读后续写主题篇-生活趣事 清单-2025届高三英语上学期一轮复习专项
- 《丰子恺漫画欣赏》课件
- 镇寺庄葡萄种植基地项目实施方案
- 中建八局建筑工程安全施工创优策划范本
- 光伏电站检修工作总结
- 山东省汽车维修工时定额(T-SDAMTIA 0001-2023)
- 惠州龙门县事业单位招聘工作人员笔试试卷2021
- 国内外可行性研究现状
- APQP问题清单模板
- 历史哲学绪论
评论
0/150
提交评论