高等院校英语入学分级测试三级分类模拟题6及答案解析.doc
《高等院校英语入学分级测试三级分类模拟题6及答案解析.doc》由会员分享,可在线阅读,更多相关《高等院校英语入学分级测试三级分类模拟题6及答案解析.doc(19页珍藏版)》请在麦多课文档分享上搜索。
1、高等院校英语入学分级测试三级分类模拟题 6 及答案解析(总分:100.00,做题时间:90 分钟)一、Two Fast Reading(总题数:1,分数:20.00)Internet HackingTwo years ago, a fifteen-year-old boy logged onto the Internet under the alias (别名) “Comrade“. To some of us, our idea of hacking might include breaking into an email account or viewing confidential(机密
2、的) company information. However, no one expected that “Comrade“ would cause a three-week shutdown at NASA, steal government email passwords, intercept over 3000 emails and download close to $ 2 million worth of software used to operate the international space station. If that was not shocking enough
3、, he had twice gained access to the computers used by the Pentagon to monitor threats of nuclear and biological warfare. Computer hacking has been around for as long as we can remembercertainly as long as we have had a World Wide Web. Occasionally, the news speaks of silly pranks which imply nothing
4、 more than a temporary shutdown of a website, although “Comrade“ hack forced a three-week shutdown for repairs and cost the U.S. government $ 41,000. Recently, the case of the hackers tampering with(损害,影响) the CIA“s website, changing the title to “Central Stupidity Agency“ and filling it with obscen
5、ities was merely a nuisance for the agency. It posed no real threat because the CIA“s files are inaccessible via that Interact site. Undoubtedly, there are some who see humour in thisa civilian, probably not even a professional, outwitting an elite US agency. No Laughing Matter There are more seriou
6、s crimes, which are no laughing matter. In one case of corporate espionage(间谍活动), two “heavy manufacturing“ firms were bidding on a $ 900 million contract ; one outbid the other by a fraction of a percent. This was no co-incidence as the losing company later discovered that someone had broken into t
7、he company“s computer network and accessed files that contained bidding strategy information. In another case, authorities are chasing an individual who regularly hires U.S. teens to access confidential documents. One young hacker was paid $1,000-and promised $10,000 morefor stealing design document
8、s for kitchen appliances from U.S. firms. Beyond selling the trade secrets to a company“s competition, some hackers resort to extortion(敲) of the company. In Sweden, a 15 and 17 year old tried to extort $ 2 million from a cellular company to destroy information they had illegally downloaded. Like mo
9、st eases of extortion, the criminal“s identity is especially difficult to trace and is magnified because of the nature of the Net. When the Internet was gaining immense popularity, businesses were scrambling(争抢) to secure domain names and using the technology to expand their market. Seeing e-commerc
10、e as an untapped goldmine, many were eagerly diving headfirst into a slew of (许多) problems, including security breaches. Companies like eBay, B, Yahoo, Amazon and Excite were not prepared when “Mafiaboy“ decided to strike. The 16-year-old Montreal teen crippled their sites last year when he bombarde
11、d them with thousands of simultaneous messages, preventing legitimate users from gaining access. His five-day tirade(长篇大论) caused an estimated $1.7 billion in damages. These malicious and insidious(隐伏的) attacks threaten security and cost companies and organizations billions of dollars. A survey of t
12、he Fortune 1000 companies in 1999 estimates a loss of $ 45 billion from information theft. Counter Strategies Many organizations are taking extra security measures, including the usage of firewalls (a security mechanism that allows limited access to sites from the Internet). Still, hackers will gain
13、 access. If a fifteen-year-old can shutdown NASA, what hope is there? Recently, Ernst the proverbial David struggling against a corporate Goliath. In many of these crimes, people do them to defy corporations or the government; money is not always the motive. However, it is an act that is still unacc
14、eptable that victimizes all who use the Internet. Viruses, shutdowns, crashes and email hacking will be the burden of the user, a company“s money lost to theft will be the burden of its customers and a government“s money spent on security will be the burden of its citizens. Is there anyone not affec
15、ted by Internet crime? Nope.(分数:20.00)(1).Which of the following about “Comrade“ is true?(分数:2.00)A.He is a middle-aged man.B.He caused a three-week shutdown at the Pentagon.C.He stole government email passwords.D.He downloaded nearly $ 3 million worth of software.(2).Hacking into the CIA“s website
16、posed no real threat because -|_|-.(分数:2.00)A.The files have already been destroyed on purpose.B.The files are inaccessible via that Internet site.C.The files are very difficult to read.D.The files have been transferred to a safe place.(3).In one case of corporate espionage, the losing company later
17、 discovered that -|_|-.(分数:2.00)A.their computer network had been badly damagedB.someone had replaced their computersC.they lost by a fraction of a percentD.someone had accessed their bidding strategy information(4).Who are the U.S. authorities chasing?(分数:2.00)A.Someone who regularly hires teens to
18、 access secret documents.B.Someone who escapes from the prison.C.Someone who evades a huge sum of taxes.D.Someone who breaks into bank accounts to steal money.(5).In Sweden, two teenagers tried to extort -|_|- from a cellular company to destroy their illegally downloaded information.(分数:2.00)A.2 mil
19、lion dollarsB.3 million dollarsC.4 million dollarsD.5 million dollars(6).Which of the following about “Mafiaboy“ is true?(分数:2.00)A.He is a 16-year-old American boy.B.He bombarded companies sites like eBay with thousands of simultaneous messages.C.He prevented illegitimate users from gaining access.
20、D.His attack caused an estimated MYM1.7 million in damages.(7).Ernst one outbid the other by a fraction of a percent. This was no co-incidence as the losing company later discovered that someone had broken into the company“s computer network and accessed files that contained bidding strategy informa
21、tion. In another case, authorities are chasing an individual who regularly hires U.S. teens to access confidential documents. One young hacker was paid $1,000-and promised $10,000 morefor stealing design documents for kitchen appliances from U.S. firms. Beyond selling the trade secrets to a company“
22、s competition, some hackers resort to extortion(敲) of the company. In Sweden, a 15 and 17 year old tried to extort $ 2 million from a cellular company to destroy information they had illegally downloaded. Like most eases of extortion, the criminal“s identity is especially difficult to trace and is m
23、agnified because of the nature of the Net. When the Internet was gaining immense popularity, businesses were scrambling(争抢) to secure domain names and using the technology to expand their market. Seeing e-commerce as an untapped goldmine, many were eagerly diving headfirst into a slew of (许多) proble
24、ms, including security breaches. Companies like eBay, B, Yahoo, Amazon and Excite were not prepared when “Mafiaboy“ decided to strike. The 16-year-old Montreal teen crippled their sites last year when he bombarded them with thousands of simultaneous messages, preventing legitimate users from gaining
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 高等院校 英语 入学 分级 测试 三级 分类 模拟 答案 解析 DOC
