n. 趨勢,傾向,方位
vi. 傾向,轉向
您現在的位置: 首頁 > 雅思 > 雅思閱讀 > 雅思閱讀模擬題 > 正文
Questions 1-4 Answer the questions below using NO MORE THAN THREE WORDS from the passage for each answer.
1. What do the hackers use to attack the computer system of the Royal Bank of Scotland?
2. Which word is most likely to be used by hackers to describe home computers?
3. What do the majority of people in the UK prefer?
4. How do hackers collect information so as to compose emails?
5. What do hackers obtain illegally to gain access to banks’ computer network?
Questions 5-12 Complete the sentences below with words from the passage.
Use NO MORE THAN THREE WORDS for each answer.
6. The use of login details of VPNs by criminals does not necessarily result in any ______________.
7. Royal Bank of Scotland claimed that they are not the only victim of ______________.
8. Corporate networks will be another target of hackers with improved _______________.
9. The attacks on individuals have been greatly increased within _______________.
10. With ________________, software used by criminals can eliminate its competing programs.
11. Home users are chosen as a target because they are considered as a __________ .
12. Get Safe Online is calling for an increase in _____________ to ensure safe home working.
Answers Keys:
1.答案:personalised emails/keyloggers (見第1段第2句:For the past year, Royal Bank of Scotland has been fighting systematic attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior management.)
2.答案:vulnerable (見第2段: The hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate IT department. )
3. 答案: flexible working (見第3段: For companies it is a growing threat as home working increases: a recent survey from the Equal Opportunities Commission found that more than 60% of the UK's population wants the option of flexible working.)
4. 答案:trawling (the) internet (見第4段第2句: Each email they send is meticulously built to make it attractive to its target, who the criminals have carefully researched by trawling the internet for information.)
5. 答案: logins and passwords/usernames and passwords (見第5段第第1、2句:The keylogger contained in the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user. This means that hackers can, using the usernames and passwords stolen by the keyloggers, …)
6. 答案: losses (見第7段第2句:In some cases sources claim that the login details of VPNs have been obtained and used though there has been no confirmation that any losses have occurred as a result.)
7. 答案: Trojan email attacks (見第8段最后1句:Trojan email attacks are an industry-wide issue and are not isolated to a particular area or a particular bank.)
8. 答案:techniques (見第9段最后1句: …said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks. )
9. 答案:two years (見第10段第1、2句:According to Mark Sunner, chief technology officer of Messagelabs, the number of malicious emails targeted at individuals has been increasing. Two years ago they were being seen once every two months, but now they are seeing one or two a day.)
10.答案:(an) antivirus system (見第11段: "The hackers are now aiming to take over computers, particularly those of home users. Some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off the programs of their competitors." )
11. 答案:weakness (見第12段最后1句: Home working is where they perceive a weakness. )
12. 答案:vigilance and security (見第13段:"This points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home. For home working to be effective, security needs to be as effective as if working in an office.")
重點單詞 | 查看全部解釋 | |||
trend | [trend] |
想一想再看 |
聯想記憶 | |
manipulate | [mə'nipjuleit] |
想一想再看 vt. 操縱,操作,控制,利用,(巧妙地)處理,篡改 |
聯想記憶 | |
attractive | [ə'træktiv] |
想一想再看 adj. 有吸引力的,引起注意的 |
聯想記憶 | |
systematic | [.sisti'mætik] |
想一想再看 adj. 有系統的,分類的,體系的 |
聯想記憶 | |
survey | [sə:'vei] |
想一想再看 v. 調查,檢查,測量,勘定,縱覽,環視 |
||
suspect | [səs'pekt] |
想一想再看 n. 嫌疑犯 |
聯想記憶 | |
assumption | [ə'sʌmpʃən] |
想一想再看 n. 假定,設想,擔任(職責等), 假裝 |
聯想記憶 | |
population | [.pɔpju'leiʃən] |
想一想再看 n. 人口 ,(全體)居民,人數 |
聯想記憶 | |
composed | [kəm'pəuzd] |
想一想再看 adj. 鎮靜的,沉著的 |
聯想記憶 | |
protect | [prə'tekt] |
想一想再看 vt. 保護,投保 |
聯想記憶 |

- 閱讀本文的人還閱讀了:
上一篇:雅思閱讀練習題1