当前位置: X题卡 > 所有题目 > 题目详情

Melissa and LoveLetter made use of the trust that exists between friends or colleagues. Imagine rece...

查看本题答案

你可能感兴趣的试题

attachment  packet  datagram  message  
memory  caches  ports  registers  
virtual  virus  worms  bacteria  
names  cookies  software  extensions  
names  cookies  software  extensions  
cracker  user  customer  client  
names  cookies  software  extensions  
cracker  user  customer  client  
virtual  virus  worms  bacteria  
attachment  packet  datagram  message  
As administrators seek to block dangerous email attachments through the recognition of well-known (9) , virus writers use other extensions to circumvent such protection. Executable(.exe)files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.  Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwouds and give the (10) access to your network.  
memory  caches  ports  registers  
names  cookies  software  extensions  
cracker  user  customer  client  
attachment  packet  datagram  message  
memory  caches  ports  registers  
attachment  packet  datagram  message  
names  cookies  software  extensions  
virtual  virus  worms  bacteria  
memory  caches  ports  registers  

热门试题

更多