【专业英语 复习】第9章 Privacy, Security,and Ethics

1. 单选题

____ scanning devices use fingerprints and iris scanners to identify individuals.

A. Biometric

B. Optical

C. Virtual

D. Visual

正确答案:A

生物识别扫描设备使用指纹和虹膜扫描器来识别个体。

2. 单选题

____ is the illegal assumption of someone's identity for the purposes of economic gain.

A. Keystroke logging

B. Cyberbullying

C. Denial of service attack

D. Identity theft

正确答案:D

身份盗窃是为了经济利益而非法冒用他人身份。

3. 单选题

These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files.

A. Freeware

B. Spyware

C. Employee-monitoring software

D. Cookies

正确答案:C

这些程序几乎记录你在电脑上的一切活动,雇主用来监控员工的电子邮件和电脑文件。

4. 单选题

A deceptive act, using the Internet, to trick people into spending their money and time for no gain is called an Internet ____.

A. Scam (诈骗)

B. Malware

C. Worm

D. Cookie

正确答案:A

利用互联网欺骗人们花费时间和金钱却得不到任何收益的欺诈行为称为互联网诈骗。

5. 单选题

____ are programs that migrate through networks and operating systems and attach themselves to various other programs and databases.

A. Web bugs

B. Viruses

C. DoS

D. Zombies

正确答案:B

病毒是通过网络和操作系统迁移并附加到各种其他程序和数据库的程序。

6. 单选题

____, a privacy issue, relates to the responsibility of controlling who is able to use data.

A. Protection

B. Encryption (编密码)

C. Access

D. Restriction

正确答案:C

访问,一个隐私问题,涉及控制谁能够使用数据的责任。

7. 单选题

The collection of data can be searched to find all the action of one person creates a ____ that reveals a highly detailed account of your life.

A. Proxy person (代理人员)

B. Virtual avatar

C. Electronic profile

D. Digital footprint

正确答案:D

数据的收集可以搜索以查找一个人的所有行为,从而形成一个详细描述你生活的数字足迹。

8. 单选题

A ____ is a computer criminal who creates and distributes malicious programs or malware.

A. Hacker

B. Cracker

C. Logger

D. Cookie

正确答案:B

黑客是创建和分发恶意程序或恶意软件的计算机犯罪分子。

9. 单选题

Which among the following is a way to shut down an ISP or website?

A. Trojan horses

B. Viruses

C. Worms

D. Denial of service attack

正确答案:D

以下哪种是关闭ISP或网站的方式?

四个感觉都不是好东西

Denial of service attack :通过使目标系统或网络资源无法提供正常服务来干扰其正常运行的攻击方式。拒绝服务攻击是关闭ISP或网站的常见方法之一,通过超载服务器或网络资源来使其无法正常工作,从而使服务不可用。

10. 单选题

Small data files that are deposited on a user's hard disk when they visit a website are called ____.

A. Codes

B. Proxies

C. Cache

D. Cookies

正确答案:D

当用户访问网站时,存储在用户硬盘上的小型数据文件称为Cookies。

11. 单选题

____ are invisible images or HTML code hidden within a web page or e-mail message and are used to transmit information without your knowledge.

A. History files

B. Cookies

C. Loggers

D. Web bugs

正确答案:D

Web bugs是嵌入在网页或电子邮件消息中的不可见图像或HTML代码,用于在你不知情的情况下传输信息。

12. 单选题

A ____ acts as a security buffer between a corporation's private network and all external networks.

A. Password

B. Virus checker

C. Firewall

D. Disaster recovery plan

正确答案:C

防火墙充当公司私有网络和所有外部网络之间的安全缓冲区。

13. 单选题

The process of coding information to make it unreadable except to those who have a special piece of information known as a key.

A. Security

B. Protection

C. Encryption (加密)

D. Restriction

正确答案:C

加密是将信息编码以使其对除了持有特定信息片段(称为密钥)的人不可读的过程。

14. 单选题

____ encrypt connections between company networks and remote users, such as workers connecting from home, creating a secure virtual connection to a company LAN across the Internet.

A. Biometrics

B. Web bugs

C. Loggers

D. Virtual private networks

正确答案:D

虚拟私人网络(VPN)加密公司网络和远程用户(如从家中连接的员工)之间的连接,为公司LAN在互联网上创建安全的虚拟连接。

15. 单选题

____ is concerned with protecting hardware from possible human and natural disasters.

A. Data security

B. Physical security

C. Phishing (网络钓鱼)

D. Cloud computing

正确答案:B

物理安全涉及保护硬件免受可能的人为和自然灾害的影响。

16. 单选题

This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.

A. Fake

B. Rogue (流氓)

C. Worm

D. Virus

正确答案:B

这种类型的Wi-Fi热点靠近合法的Wi-Fi热点运行,并窃取用户名和密码等信息。

17. 单选题

According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away?

A. Computer Abuse Amendments Act

B. The Gramm-Leach-Bliley Act

C. Digital Millennium Copyright Act (数字千年版权法)

D. Computer Fraud and Abuse Act

正确答案:C

根据哪部法律,商业程序的所有者制作备份副本用于个人使用并且重新销售或赠送是非法的?

18. 单选题

The use of the Internet to send or post content intended to hurt or embarrass another person.

A. Snoopware

B. Cyberbullying (网上欺凌)

C. Auction fraud

D. Identity theft

正确答案:B

利用互联网发送或发布意图伤害或羞辱他人的内容。

19. 单选题

____ is representing some other person's work and ideas as your own without giving credit to the original source.

A. Key logging

B. Phishing

C. Blogging

D. Plagiarism (剽窃)

正确答案:D

剽窃是将他人的作品和想法作为自己的而不给原始来源以功劳。

20. 单选题

Which type of program would likely be used by investigators to record a potential suspect's Internet activities?

A. Cookie

B. Web bug

C. Global positioning system

D. Keylogger (关键日志记录)

正确答案:D

调查人员可能使用哪种类型的程序记录潜在嫌疑人的互联网活动?

21. 单选题

____ is concerned with protecting software and data from unauthorized tampering or damage.

A. Data security

B. Disaster recovery plan

C. Data backup

D. Physical security

正确答案:A

数据安全涉及保护软件和数据免受未经授权的篡改或损坏。

22. 单选题

A ____ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.

A. Web bug

B. Trojan horse

C. Dictionary

D. Denial of service

正确答案:C

____攻击使用软件依次尝试数千个常见单词,试图获得未经授权的访问。

23. 单选题

Which of the following is not a measure to protect computer security?

A. Keeping the same password on all systems consistently

B. Restricting access

C. Copying data and storing it at a remote location

D. Encrypting data

正确答案:A

以下哪种不是保护计算机安全的措施?

24. 单选题

A ____ attempts to slow down or stop a computer system or network by sending repetitive requests for information.

A. Zombie (僵尸)

B. Trojan horse

C. DoS attack

D. Worm

正确答案:C

____试图通过发送重复的信息请求来减慢或停止计算机系统或网络。

25. 单选题

Which of the following is not malware?

A. Ad-Aware

B. Trojan horses

C. Viruses

D. Worms

正确答案:A

以下哪个不是恶意软件?

Ad-Aware是一款合法的反间谍软件和防病毒程序,旨在检测和清除计算机系统中的广告软件和间谍软件等恶意软件。

26. 单选题

Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are called ____.

A. Web bugs

B. Zombies

C. Phishes

D. DoS sites

正确答案:B

被病毒、蠕虫或特洛伊木马感染的计算机,允许对它们进行恶意远程控制,这被称为____。

27. 单选题

The most significant concerns for implementation of computer technology involve ____, security, and ethics.

A. Property

B. Access

C. Privacy

D. Accuracy

正确答案:C

在计算机技术的实现中,最重要的问题涉及到____、安全性和伦理学。

28. 单选题

____ are used by advertising companies to keep track of your web activity as you move from one site to the next.

A. Keyloggers

B. Third-party cookies

C. Sniffers

D. First-party cookies

正确答案:B

____被广告公司用来在你从一个网站转移到下一个网站时跟踪你的网络活动。

29. 单选题

____ is the act of creating and distributing malicious programs.

A. Hacking

B. Cracking (破解)

C. Phishing

D. Spamming

正确答案:B

____是一种创建和分发恶意程序的行为。

30. 单选题

Which of the following is a type of malware that hides inside other software, usually as an attachment or a downloadable file?

A. Virus

B. Worm

C. Trojan horse

D. Spyware

正确答案:C

以下哪种恶意软件通常隐藏在其他软件内部,通常作为附件或可下载文件?

31. 单选题

____ is a program that secretly records what you type on your computer.

A. Virus

B. Worm

C. Trojan horse

D. Keylogger

正确答案:D

Keylogger是一种秘密记录你在电脑上输入内容的程序。

32. 单选题

What is the main purpose of encryption?

A. To protect data from unauthorized access

B. To increase data storage capacity

C. To improve data transmission speed

D. To decrease data redundancy

正确答案:A

加密的主要目的是保护数据免受未经授权的访问。

33. 单选题

Which of the following types of software provides security for the data and programs on your computer by detecting and removing malicious software?

A. Firewall

B. Antivirus (杀毒)

C. Backup software

D. Encryption

正确答案:B

以下哪种软件通过检测和删除恶意软件为你电脑上的数据和程序提供安全保护?

相关推荐
IOT那些事儿5 个月前
自动化专业英语
自动化·专业英语·电子电气
数据知道6 个月前
系统架构设计师【补充知识】: 专业英语 (核心总结)
系统架构·软考高级·系统架构设计师·专业英语
qing影7 个月前
Exercise 10
专业英语
最爱那不息的变幻1 年前
考研复试英语口语问答举例第二弹
数据结构·考研·算法·面试·复试·专业英语·英语面试