51● Melissa and LoveLetter made use of the trust that exists between friends or colleagues.Imagine receiving an __(71)___from a friend who asks you to open it. This is what happens withMelissa and several other similar email __(72)___.Upon running ,such worms usually proceedto send themselves out to email addresses from the victim's address book, previous emails, webpages__(73)___. As administrators seek to block dangerous email attachments through the recognition ofwell-known ___(74)____,virus writers use other extensions to circumvent such protection.Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and willstill run and successfully infect target users. Frequently ,hackers try to penetrate networks by sending an attachment that looks like a flashmovie ,which, while displaying some cute animation ,simultaneously runs commands in thebackground to steal your passwords and give the __(75)__access to your network.
A.attachment
B.packet
C.datagram
D.message
开始考试练习点击查看答案