题目内容 (请给出正确答案)
[主观题]

Pharming is a scamming practice in which malicious code is installed on a personal compute

r or server, misdirecting users to (71)Web sites without their knowledge or consent. Pharming has been called "phishing without a lure".

In phishing, the perpetrator sends out legitimate-(72)e-mails, appearing to come from some of the Web's most popular sites, in an effort to obtain personal and financial information from individual recipients. But in pharming, larger numbers of computer users can be(73)because it is not necessary to target individuals one by one and no conscious action is required on the part of the victim. In one form. of pharming attack, code sent in an e-mail modifies local host files on a personal computer. The host files convert URLs into the number strings that the computer uses to access Web sites. A computer with a compromised host file will go to the fake Web site even if a user types in the correct Internet address or clicks on an affected(74)entry. Some spyware removal programs can correct the corruption, but it frequently recurs unless the user changes browsing(75 ).

A.few

B.fraudulent

C.normal

D.structured

提问人:网友liuyang1110 发布时间:2022-01-07
参考答案
查看官方参考答案
如搜索结果不匹配,请 联系老师 获取答案
更多“Pharming is a scamming practic…”相关的问题
第1题
下列被称作是缓冲区溢出攻击代名词的是()。
下列被称作是缓冲区溢出攻击代名词的是()。

A、Phishing

B、Pharming

C、DoS

D、Shellcode

点击查看答案
第2题
Pharming is a scamming practice in which malicious code is installed on a personal compute
r or server, misdirecting users to(71)Web sites without their knowledge or consent. Pharming has been called "phishing without a lure."

In phishing, the perpetrator sends out legitimate-(72)E-mails, appearing to come from some of the Web's most popular sites, in ah effort to obtain personal and financial information from individual recipients. But in pharming, larger numbers of computer users can be(73)because it is not necessary to target individuals one by one and no conscious action is required on the part of the victim. In one form. of pharming attack, code sent in an E-mail modifies local host files on a personal computer. The host files convert URLs into the number strings that the computer uses to access Web sites. A computer with a compromised host file will go to the fake Web site even if a user types in the correct Internet address or clicks on an affected(74)entry. Some spyware removal programs can correct the corruption, but it frequently recurs unless the user changes browsing(75).

A.few

B.fraudulent

C.normal

D.structured

点击查看答案
第3题
Pharming is a scamming practice in which malicious code is installed on a personal compute
r or server, misdirecting users to(74)Web sites without their knowledge or consent。

A.available

B.fraudulent

C.normal

D.structured

点击查看答案
第4题
Pharming is a scamming practice in which malicious code is installed on a personal compute
r or server, misdirecting users to(71)fraudulent Web sites without their knowledge or consent. Pharming has been called "phishing without a lure".

In phishing, the perpetrator sends out legitimate-(72)looking e-malls, appearing to come from some of the Web's most popular sites, in an effort to obtain personal and financial information from individual recipients. But in pharming, larger numbers of computer users can be(73)victimized because it is not necessary to target individuals one by one and no conscious action is required on the part of the victim. In one form. of pharming attack, code sent in an e-mail modifies local host files on a personal computer. The host files convert URLs into the number strings that the computer uses to access Web sites. A computer with a compromised host file will go to the fake Web site even if a user types in the correct Internet address or clicks on an affected(74)bookmark entry. Some spyware removal programs can correct the corruption, but it frequently recurs unless the user changes browsing.(75)habits.

A.few

B.fraudulent

C.normal

D.structured

点击查看答案
账号:
你好,尊敬的用户
复制账号
发送账号至手机
密码将被重置
获取验证码
发送
温馨提示
该问题答案仅针对搜题卡用户开放,请点击购买搜题卡。
马上购买搜题卡
我已购买搜题卡, 登录账号 继续查看答案
重置密码
确认修改
欢迎分享答案

为鼓励登录用户提交答案,简答题每个月将会抽取一批参与作答的用户给予奖励,具体奖励活动请关注官方微信公众号:简答题

简答题官方微信公众号

警告:系统检测到您的账号存在安全风险

为了保护您的账号安全,请在“简答题”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!

微信搜一搜
简答题
点击打开微信
警告:系统检测到您的账号存在安全风险
抱歉,您的账号因涉嫌违反简答题购买须知被冻结。您可在“简答题”微信公众号中的“官网服务”-“账号解封申请”申请解封,或联系客服
微信搜一搜
简答题
点击打开微信