题目内容 (请给出正确答案)
提问人:网友f******g 发布时间:2023年2月25日 12:20
[单项选择题]

SoBig. F was the more visible of the two recent waves of infection because it propagated itself by e-mail, meaning that victims noticed what was going on. SoBig. F was so effective that it caused substantial disruption even to those protected by anti-virus software. That was because so many copies of the virus spread (some 500,000 computers were infected) that many machines were overwhelmed by messages from their own anti-virus software. On top of that, one common counter-measure backfired, increasing traffic still further. Anti-virus software often bounces a warning back to the sender of an infected e-mail, saying that the e-mail in question cannot be delivered because it contains a virus. SoBig. F was able to spoof this system by "harvesting" e-mail addresses from the hard disks of infected computers. Some of these addresses were then sent infected e-mails that had been doctored to look as though they had come from other harvested addresses. The latter were thus sent warnings, even though their machines may not have been infected. Kevin Haley of Symantec, a firm that makes anti-virus software, thinks that one reason SoBig. F was so much more effective than other viruses that work this way is because it was better at searching hard drives for addresses. Brian King, of CERT, an internet-security centre at Carnegie-Mellon University in Pittsburgh, notes that, unlike its precursors, SoBig. F was capable of "multi-threading", it could send multiple e-mails simultaneously, allowing it to dispatch thousands in minutes. Blaster worked by creating a "buffer overrun in the remote procedure call". In English, that means it attacked a piece of software used by Microsoft’s Windows operating system to allow one computer to control another. It did so by causing that software to use too much memory. Most worms work by exploiting weaknesses in an operating system, but whoever wrote Blaster had a particularly refined sense of humour, since the website under attack was the one from which users could obtain a program to fix the very weakness in Windows that the worm itself was exploiting. One Way to deal with a wicked worm like Blaster is to design a fairy godmother worm that goes around repairing vulnerable machines automatically. In the case of Blaster someone seems to have tried exactly that with a program called Welchi. However, according to Mr. Haley, Welchi has caused almost as many problems as Blaster itself, by overwhelming networks with "pings" signals that checked for the presence of other computers. Though both of these programs fell short of the apparent objectives of their authors, they still caused damage. For instance, they forced the shutdown of a number of computer networks, including the one used by the New York Times newsroom, and the one organising trains operated by CSX, a freight company on America’s east coast. Computer scientists expect that it is only a matter of time before a truly devastating virus is unleashed.

A.sending them an overpowering number of messagesB.harvesting the addresses stored in the computersC.infecting the computers with an invisible virusD.destroying the anti-virus software of the computers

参考答案
十点题库官方参考答案 (由十点题库聘请的专业题库老师提供的解答)
更多“SoBig. F was the more visible ”相关的问题
XJ的作用是记录进路的始端和防止信号自动关闭。
A . 正确
B . 错误
点击查看答案
中心高度
点击查看答案
幕墙常用的钢材(型钢和钢板)的牌号、力学性能以及防腐要求, 配套的焊条牌号。
点击查看答案
“法洛四联征”基本改变不包括()
A . A.主动脉骑跨
B . B.三尖瓣下移
C . C.右心室肥厚
D . D.高位室间隔缺损
E . E.漏斗部肺动脉狭窄
点击查看答案
关于正态均值μ的假设检验(σ已知情形)常用的三对假设为( )。
A.H0:μ≤μ0,H1:μ>μ0
B.H0:μ≥μ0μ0,H1:μ<μ0
C.H0:μ=μ0,H1:μ≠μ0
D.H0:μ≤μ0,H1:μ<μ0
E.H0:μ≥μ0,H1:μ>μ0
点击查看答案
表示毒性的常用指标有哪些?
点击查看答案
在满足消费者需求的同时,还需要对产品的功能及其成本之间的取舍进行系统的分析,这指的就是()。
A.作业管理B.约束理论C.全面质量管理D.价值工程
点击查看答案
对于开发商隐瞒多建设的车位车库,业主可能对开发商行使()请求权。
A.违约损害赔偿
B.侵权损害赔偿
C.返还原物
D.排除妨害
点击查看答案
《焊接工艺(作业)指导书》的编制,必须由应用部门()主持进行。
A.技术人员
B.监理工程师
C.项目经理
D.焊接专业工程师
点击查看答案
典型的正弦跳汰周期,其特点是水流上升和下降的时间(),速度和加速度本身的变化也()。
点击查看答案
除了简洁、完整、及时以外,电话留言记录的原则还包括()。
A . 清楚
B . 详细
C . 及时
D . 全面
点击查看答案
CMIS系统生成合同编号的规则()。
A.单位组织机构编码--四位年份—合同类别代码—流水号 B.四位年份—单位组织机构编码—合同类别代码—流水号 C.合同类别代码—单位组织结构编码—两位年份—流水号 D.单位组织机构编码—两位年份—合同类别代码—流水号
点击查看答案
实行定期定额缴纳税款的纳税人,可以采取的申报方式是()。
A . 自行申报
B . 邮寄申报
C . 数据电文申报
D . 简易申报和简并征期
点击查看答案
若f(t)是实奇信号,其频谱 是w 的实偶频谱。
点击查看答案
保险费属于商品流通企业物流成本中的( )。 A.人工费用 B.运营费用 C.财务费用 D.其他费用
A.人工费用
B.运营费用
C.财务费用
点击查看答案
客服
TOP