《2023年四川考研英语考试考前冲刺卷.docx》由会员分享,可在线阅读,更多相关《2023年四川考研英语考试考前冲刺卷.docx(111页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。
1、2023年四川考研英语考试考前冲刺卷本卷共分为1大题50小题,作答时间为180分钟,总分100分,60分及格。一、单项选择题(共50题,每题2分。每题的备选项中,只有一个最符合题意) 1.Text 2SoBig. F was the more visible of tile two recent waves of infection, because it propagated itself by e-mail, meaning that victims noticed what was going on. SoBig. F was so effective that it caused su
2、bstantial disruption even to those protected by anti-virus software. That was because so many copies of the virus spread that many machines were overwhelmed by messages from their own anti-virus software. On top of that, one common counter-measure backfired, increasing traffic still furthers. Anti-v
3、irus software often bounces a warning back to the sender of an infected e-mail, saying that the e-mail in question cannot be delivered because it contains a virus. SoBig. F was able to spoof this system by harvesting e-mail addresses from the hard disks of infected computers. Some of these addresses
4、 were then sent infected e-mails that had been doctored to look as though they had come from other harvested addresses. The latter were thus sent warnings, even though their machines may not have been infected.Kevin Haley of Symantec, a firm that makes anti-virus software, thinks that one reason SoB
5、ig. F was so much more effective than other viruses that work this way is because it was better at searching hard-drives for addresses. Brian King, of CERT, an internet-security center at Carnegie- Mellon University in Pittsburgh, note that, unlike its precursors, SoBig. F was capable of multi- thre
6、ading: it could send multiple e-mails simultaneously, allowing it to dispatch thousands in minutes.Blaster worked by creating a buffer overrun in the remote procedure call. In other word, that means it attacked a piece of software used by Microsoft’s Windows operating system to allow one compu
7、ter to control another. It did so by causing that software to use too much memory.Most worms work by exploiting weaknesses in an operating system, but whoever wrote Blaster had a particularly refined sense of humor, since the website under attack was the one from which users could obtain a program t
8、o fix the very weakness in Windows that the worm itself was exploiting.One way to deal with a wicked worm like Blaster is to design a fairy godmother worm that goes around repairing vulnerable machines automatically. In the case of Blaster someone seems to have tried exactly that with a program call
9、ed Welchi. However, according to Mr. Haley, Welchi has caused almost as many problems as Blaster itself, by overwhelming networks with pings - signals that checked for the presence of other computers.Though both of these programs fell short of the apparent objectives of their authors, they still cau
10、sed damage. For instance, they forced the shutdown of a number of computer networks, including the one used by the New York Times newsroom, and the one organizing trains operated by CSX, a freight company on America’s east coast. Computer scientists expect that it is only a matter of time befo
11、re a truly devastating virus is unleashed.We learn from the passage that Welchi is()Aa wicked worm causing as many damages as Blaster did.Ba program designed by Haley to detect worms like Blaster.Ca program intended to fix the infected machines.Da worm meant to defeat the virus with pings.2.Text 2So
12、Big. F was the more visible of tile two recent waves of infection, because it propagated itself by e-mail, meaning that victims noticed what was going on. SoBig. F was so effective that it caused substantial disruption even to those protected by anti-virus software. That was because so many copies o
13、f the virus spread that many machines were overwhelmed by messages from their own anti-virus software. On top of that, one common counter-measure backfired, increasing traffic still furthers. Anti-virus software often bounces a warning back to the sender of an infected e-mail, saying that the e-mail
14、 in question cannot be delivered because it contains a virus. SoBig. F was able to spoof this system by harvesting e-mail addresses from the hard disks of infected computers. Some of these addresses were then sent infected e-mails that had been doctored to look as though they had come from other har
15、vested addresses. The latter were thus sent warnings, even though their machines may not have been infected.Kevin Haley of Symantec, a firm that makes anti-virus software, thinks that one reason SoBig. F was so much more effective than other viruses that work this way is because it was better at sea
16、rching hard-drives for addresses. Brian King, of CERT, an internet-security center at Carnegie- Mellon University in Pittsburgh, note that, unlike its precursors, SoBig. F was capable of multi- threading: it could send multiple e-mails simultaneously, allowing it to dispatch thousands in minutes.Bla
17、ster worked by creating a buffer overrun in the remote procedure call. In other word, that means it attacked a piece of software used by Microsoft’s Windows operating system to allow one computer to control another. It did so by causing that software to use too much memory.Most worms work by e
18、xploiting weaknesses in an operating system, but whoever wrote Blaster had a particularly refined sense of humor, since the website under attack was the one from which users could obtain a program to fix the very weakness in Windows that the worm itself was exploiting.One way to deal with a wicked w
19、orm like Blaster is to design a fairy godmother worm that goes around repairing vulnerable machines automatically. In the case of Blaster someone seems to have tried exactly that with a program called Welchi. However, according to Mr. Haley, Welchi has caused almost as many problems as Blaster itsel
20、f, by overwhelming networks with pings - signals that checked for the presence of other computers.Though both of these programs fell short of the apparent objectives of their authors, they still caused damage. For instance, they forced the shutdown of a number of computer networks, including the one
21、 used by the New York Times newsroom, and the one organizing trains operated by CSX, a freight company on America’s east coast. Computer scientists expect that it is only a matter of time before a truly devastating virus is unleashed.The word doctored ( Line 9, Paragraph 1 ) probably means()Ac
22、ured a disease,Bdiagnosed a virus.Cbecame a doctor.Dchanged to deceive.3.Text 2SoBig. F was the more visible of tile two recent waves of infection, because it propagated itself by e-mail, meaning that victims noticed what was going on. SoBig. F was so effective that it caused substantial disruption
23、even to those protected by anti-virus software. That was because so many copies of the virus spread that many machines were overwhelmed by messages from their own anti-virus software. On top of that, one common counter-measure backfired, increasing traffic still furthers. Anti-virus software often b
24、ounces a warning back to the sender of an infected e-mail, saying that the e-mail in question cannot be delivered because it contains a virus. SoBig. F was able to spoof this system by harvesting e-mail addresses from the hard disks of infected computers. Some of these addresses were then sent infec
25、ted e-mails that had been doctored to look as though they had come from other harvested addresses. The latter were thus sent warnings, even though their machines may not have been infected.Kevin Haley of Symantec, a firm that makes anti-virus software, thinks that one reason SoBig. F was so much mor
26、e effective than other viruses that work this way is because it was better at searching hard-drives for addresses. Brian King, of CERT, an internet-security center at Carnegie- Mellon University in Pittsburgh, note that, unlike its precursors, SoBig. F was capable of multi- threading: it could send
27、multiple e-mails simultaneously, allowing it to dispatch thousands in minutes.Blaster worked by creating a buffer overrun in the remote procedure call. In other word, that means it attacked a piece of software used by Microsoft’s Windows operating system to allow one computer to control anothe
28、r. It did so by causing that software to use too much memory.Most worms work by exploiting weaknesses in an operating system, but whoever wrote Blaster had a particularly refined sense of humor, since the website under attack was the one from which users could obtain a program to fix the very weakne
29、ss in Windows that the worm itself was exploiting.One way to deal with a wicked worm like Blaster is to design a fairy godmother worm that goes around repairing vulnerable machines automatically. In the case of Blaster someone seems to have tried exactly that with a program called Welchi. However, a
30、ccording to Mr. Haley, Welchi has caused almost as many problems as Blaster itself, by overwhelming networks with pings - signals that checked for the presence of other computers.Though both of these programs fell short of the apparent objectives of their authors, they still caused damage. For insta
31、nce, they forced the shutdown of a number of computer networks, including the one used by the New York Times newsroom, and the one organizing trains operated by CSX, a freight company on America’s east coast. Computer scientists expect that it is only a matter of time before a truly devastatin
32、g virus is unleashed.SoBig. F damaged computer programs mainly by()Asending them an overpowering number of messages.Bharvesting the addresses stored in the computers.Cinfecting the computers with an invisible virus.Ddestroying the anti-virus software of the computers.4.Text 2SoBig. F was the more vi
33、sible of tile two recent waves of infection, because it propagated itself by e-mail, meaning that victims noticed what was going on. SoBig. F was so effective that it caused substantial disruption even to those protected by anti-virus software. That was because so many copies of the virus spread tha
34、t many machines were overwhelmed by messages from their own anti-virus software. On top of that, one common counter-measure backfired, increasing traffic still furthers. Anti-virus software often bounces a warning back to the sender of an infected e-mail, saying that the e-mail in question cannot be
35、 delivered because it contains a virus. SoBig. F was able to spoof this system by harvesting e-mail addresses from the hard disks of infected computers. Some of these addresses were then sent infected e-mails that had been doctored to look as though they had come from other harvested addresses. The
36、latter were thus sent warnings, even though their machines may not have been infected.Kevin Haley of Symantec, a firm that makes anti-virus software, thinks that one reason SoBig. F was so much more effective than other viruses that work this way is because it was better at searching hard-drives for
37、 addresses. Brian King, of CERT, an internet-security center at Carnegie- Mellon University in Pittsburgh, note that, unlike its precursors, SoBig. F was capable of multi- threading: it could send multiple e-mails simultaneously, allowing it to dispatch thousands in minutes.Blaster worked by creatin
38、g a buffer overrun in the remote procedure call. In other word, that means it attacked a piece of software used by Microsoft’s Windows operating system to allow one computer to control another. It did so by causing that software to use too much memory.Most worms work by exploiting weaknesses i
39、n an operating system, but whoever wrote Blaster had a particularly refined sense of humor, since the website under attack was the one from which users could obtain a program to fix the very weakness in Windows that the worm itself was exploiting.One way to deal with a wicked worm like Blaster is to
40、 design a fairy godmother worm that goes around repairing vulnerable machines automatically. In the case of Blaster someone seems to have tried exactly that with a program called Welchi. However, according to Mr. Haley, Welchi has caused almost as many problems as Blaster itself, by overwhelming net
41、works with pings - signals that checked for the presence of other computers.Though both of these programs fell short of the apparent objectives of their authors, they still caused damage. For instance, they forced the shutdown of a number of computer networks, including the one used by the New York
42、Times newsroom, and the one organizing trains operated by CSX, a freight company on America’s east coast. Computer scientists expect that it is only a matter of time before a truly devastating virus is unleashed.What can we infer from the last paragraph()AComputer scientists are quit optimisti
43、c about the existing anti-virus programs.BComputer scientists are looking forward to the coming anti-virus programs.CComputer scientists consider the existing viruses not the really destructive ones.DComputer scientists regard the coming viruses as the really destructive ones.5.Text 2SoBig. F was th
44、e more visible of tile two recent waves of infection, because it propagated itself by e-mail, meaning that victims noticed what was going on. SoBig. F was so effective that it caused substantial disruption even to those protected by anti-virus software. That was because so many copies of the virus s
45、pread that many machines were overwhelmed by messages from their own anti-virus software. On top of that, one common counter-measure backfired, increasing traffic still furthers. Anti-virus software often bounces a warning back to the sender of an infected e-mail, saying that the e-mail in question
46、cannot be delivered because it contains a virus. SoBig. F was able to spoof this system by harvesting e-mail addresses from the hard disks of infected computers. Some of these addresses were then sent infected e-mails that had been doctored to look as though they had come from other harvested addres
47、ses. The latter were thus sent warnings, even though their machines may not have been infected.Kevin Haley of Symantec, a firm that makes anti-virus software, thinks that one reason SoBig. F was so much more effective than other viruses that work this way is because it was better at searching hard-d
48、rives for addresses. Brian King, of CERT, an internet-security center at Carnegie- Mellon University in Pittsburgh, note that, unlike its precursors, SoBig. F was capable of multi- threading: it could send multiple e-mails simultaneously, allowing it to dispatch thousands in minutes.Blaster worked b
49、y creating a buffer overrun in the remote procedure call. In other word, that means it attacked a piece of software used by Microsoft’s Windows operating system to allow one computer to control another. It did so by causing that software to use too much memory.Most worms work by exploiting weaknesses in an operating system, but whoever wrote Blaster had a particularly refined sense of humor, since the website under attack was the one from which users could obtain a program to fix the very weak