試卷征集
加入會(huì)員
操作視頻
當(dāng)前位置: 試題詳情
There's something that makes this situation really dangerous:weak passwords.So not only are you setting weak passwords,but you're using them for multiple accounts as well.
   Let's see how this would play out in a cyber attack.The cyber criminal employs an automatic system to detect vulnerabilities in your system.
   Once the infection happens,it will try to crack your passwords.It will probably take less than a few seconds to find out you're using "12345678" as your passwords.The attacker will then try to see if you're using this password for other accounts.When he finds out you do,all your accounts sharing this weak security measure will be exposed,with the attacker being able to gather all the data you have stored inside in a matter of minutes.And all this could happen while you're sipping on your latte(拿鐵咖啡).
   If you don't believe your data is valuable enough to make you a target,think again.Cyber criminals have a lot of objectives,from stealing your money to using you to get to your company or someone else.There's always a way they can rob you,or use your resources to launch additional attacks.You can be the main target or just the means to an end.

(1)Fill in the blanks according to the passage.
Outline Main idea
Argument
Weak
Weak
passwords are not safe.
Body The cyber criminals will
detect
detect
and
crack
crack
your passwords.
The
attacker
attacker
will find out whether you are using the same passwords for other accounts.
All your accounts will be
exposed
exposed
in a few minutes.
Results Steal your
money
money
;get to your
company
company
;launch other
attacks
attacks
.
(2)Which of the following is the best title for the passage?
B
B

A.Bad Cyber Attack
B.No Weak Passwords
C.Data Is Valuable
D.Prevent Cyber Criminal
(3)Write a blog post according to the passage.
No Weak Passwords
No Weak Passwords
Today I thought I'd blog about a problem which has been ignored by many of our netizens.
weak password
weak password
I'm not an expert,but many years as a blogger have taught me a thing or two.
   A cyber attacker will do the following to put you in risk.First of all,
the cyber criminal will detect and crack your passwords if you use a weak password like 12345678
the cyber criminal will detect and crack your passwords if you use a weak password like 12345678
.
    Second,
the attacker will find out whether you are
using the same passwords for other accounts
the attacker will find out whether you are
using the same passwords for other accounts
.
   Naturally,
when he finds out you do,all your accounts will be exposed in a few minutes
when he finds out you do,all your accounts will be exposed in a few minutes
.
   Then,the following results will never be avoided happening.For example,
your money will be stolen
your money will be stolen
,
your company will be reached via you and additional attacks will be launched
your company will be reached via you and additional attacks will be launched
.You will be the target and you will also be means to attack others.
   Have you had any bad experiences online,or do you have some good advice for staying safe?Post your comments below!
【考點(diǎn)】說明文;科普知識(shí)
【答案】Weak;detect;crack;attacker;exposed;money;company;attacks;B;No Weak Passwords;weak password;the cyber criminal will detect and crack your passwords if you use a weak password like 12345678;the attacker will find out whether you are
using the same passwords for other accounts;when he finds out you do,all your accounts will be exposed in a few minutes;your money will be stolen;your company will be reached via you and additional attacks will be launched
【解答】
【點(diǎn)評(píng)】
聲明:本試題解析著作權(quán)屬菁優(yōu)網(wǎng)所有,未經(jīng)書面同意,不得復(fù)制發(fā)布。
發(fā)布:2024/7/20 8:0:8組卷:0引用:0難度:0.9
相似題
  • 1.
    A.method B.other than C.destination D.unique E.amazing F.cut
    This four-day walking tour will take you on(1)
    paths through the Andes Mountains on the way to the city of Machu Picchu.After reaching your(2)
    ,you will have a day to explore and be amazed by this ancient city.Especially amazing is the Incas' dry stone(3)
    .of building.Inca builders(4)
    stones to exact sizes so that nothing was needed to hold walls together(5)
    the perfect fit of the stones.
    發(fā)布:2024/9/20 1:0:9組卷:0引用:2難度:0.5
  • 2.    Heated (1)
    (argue) and cold silences are common between teenagers and their parents, (2)
    is because teenagers usually go through physical and mental changes in their growth.They have a strong desire for independence as well as their parents' love and support.It can be a tough challenge for them (3)
    (achieve) a balance.
        It must (4)
    (stress) that they can improve the situation by communicating (5)
    (regular) in an honest way.The key to (6)
    (maintain) a good parent-child relationship is to understand the situation from each other's point of view.Whenever quarrels come about,teenagers must remember that perhaps their parents (7)
    (experience) something similar and their advice is quite (8)
    (benefit).
        The good news is (9)
    the stormy period will not last long.Everything will turn (10)
    fine in the end.
    發(fā)布:2024/9/20 3:0:8組卷:4引用:3難度:0.5
  • 3.
    A.willing B.educated C.pushing D.generation E.teenagers F.volunteer
    Does the face-down(1)
    need a hands-up?Well,probably not.The fact is that many of today's teenagers are better(2)
    and more creative than past generations.They also seem to be enthusiastic and(3)
    to become leaders.More young people than ever(4)
    to help their communities.There are also brave young people such as Malala Yousafzai,the teenager who won the 2014 Nobel Peace Prize for(5)
    girls' rights to go to school.
    發(fā)布:2024/9/20 1:0:9組卷:0引用:2難度:0.5
小程序二維碼
把好題分享給你的好友吧~~
APP開發(fā)者:深圳市菁優(yōu)智慧教育股份有限公司 | 應(yīng)用名稱:菁優(yōu)網(wǎng) | 應(yīng)用版本:4.8.2  |  隱私協(xié)議      第三方SDK     用戶服務(wù)條款廣播電視節(jié)目制作經(jīng)營許可證出版物經(jīng)營許可證網(wǎng)站地圖本網(wǎng)部分資源來源于會(huì)員上傳,除本網(wǎng)組織的資源外,版權(quán)歸原作者所有,如有侵犯版權(quán),請(qǐng)立刻和本網(wǎng)聯(lián)系并提供證據(jù),本網(wǎng)將在三個(gè)工作日內(nèi)改正