首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to (71
Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to (71
admin
2010-01-29
19
问题
Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to (71)Web sites without their knowledge or consent. Pharming has been called "phishing without a lure".
In phishing, the perpetrator sends out legitimate-(72)e-mails, appearing to come from some of the Web’s most popular sites, in an effort to obtain personal and financial information from individual recipients. But in pharming, larger numbers of computer users can be(73)because it is not necessary to target individuals one by one and no conscious action is required on the part of the victim. In one form of pharming attack, code sent in an e-mail modifies local host files on a personal computer. The host files convert URLs into the number strings that the computer uses to access Web sites. A computer with a compromised host file will go to the fake Web site even if a user types in the correct Internet address or clicks on an affected(74)entry. Some spyware removal programs can correct the corruption, but it frequently recurs unless the user changes browsing( 75 ).
选项
A、victimized
B、personate
C、identity
D、control
答案
A
解析
转载请注明原文地址:https://jikaoti.com/ti/og67FFFM
本试题收录于:
网络规划设计师上午综合知识考试题库软考高级分类
0
网络规划设计师上午综合知识考试
软考高级
相关试题推荐
WhydopeoplereadnegativeInternetcommentsanddootherthingsthatwillobviouslybepainful?Becausehumanshaveaninheren
TheInternethasturnedintoamassivesurveillancetool.We’reconstantlymonitored,sometimesbycorporationswantingtosell
Google,whichdominatesmuchoflifeontheInternet,hasbeentryingtoexpandbeyondcomputersandtelephonestolivingrooms,
Twomonthsago,yougotajobasaneditor.Butnowyoufindthattheworkdoesn’tsuittoyourpersonalinterest.Writealett
八皇后问题(输出所有情况,不过有些结果只是旋转了90度而已)。哈哈:)回溯算法的典型例题
.net中读写数据库需要用到哪些类?他们的作用
在金山网镖中添加一个端口过滤规则,其中端口为3080,协议为TCP,类型为远程,操作为禁止。
设置CuteFTP在启动时加载站点管理器,在连接不通的情况下重连接的次数不超过8次。
用手动的方法设置IP地址,其中IP地址为“202.204.54.23”,默认网关为“202.204.54.1”,DNS服务器地址为“202.106.60.10”。
某信用卡客户管理系统中,有客户模式:credit_in(C_no,C_name,limit,Credit_balance),其中C_no、C_name、limit、Credit_balance分别表示客户号、客户姓名、信用额度和累计消费额,该模式的__
随机试题
TheName"UnitedNations"Thename"UnitedNations"was【C1】______(probable)devisedbyU.S.【C2】______(preside)FranklinD.Ro
下列选项中属于走私行为的是()。
可以在所在地海关办理注册登记的包括报关企业和进出口货物收发货人。()
商业银行开展需要批准的个人理财业务需要相关从业人员具备的资格不包括()。
有效的教学设计包含着怎样的特征?
在野:执政
要素主义思潮的主要代表人物是(),他在《一个要素主义者促进美国教育纲要》中,首次全面阐述了要素主义教育的基本观点。
In1985whenaJapanAirLines(JAL)jetcrashed,itspresident,YasumotoTakagi,calledeachvictim’sfamilytoapologize,and
张某带两岁的女儿甲在村头玩耍,一个五岁的小男孩乙从后面跑上来将甲推倒,张某一把抓住乙顺手一推,乙倒地头部碰在石头上,一动不动,张某认为乙已死,就把乙抱到村外准备埋掉,掩埋时,突然感觉乙好像动了一下,以为乙没死,就用石头砸乙头部后将乙埋掉离去。案发后,经鉴定
Mostpeoplehavenoideaofthehardworkandworrythatgointothecollectingofthosefascinatingbirdsandanimalsthatthey
最新回复
(
0
)