单选题 Melissa and Love Letter made use of the trust that exists between friends or colleagues. Imagine receiving an (66) from a friend who asks you to open it. This is what happens with Melissa and several other similar email (67) . Upon running, such worms usually proceed to send themselves out to email addresses from the victim' s address book ,previous emails, web pages (68) .
As administrators seek to block dangerous email attachments through the recognition of well- known (69) , virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to . bat and . cnd plus a whole list of other extensions and will still run and successfully infect target users. Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the (70) access to your network.

【正确答案】 A
【答案解析】[解析] 梅丽莎病毒和爱虫病毒都是利用同事或朋友之间的信任。假设收到一封来自朋友的附件,并让你打开看看,这就是梅丽莎以及其他类似的邮件病毒惯用的方式。不断地前进,这些“蠕虫”会将自己寄给那些从牺牲者的邮件薄里或上一封邮件或网页登陆得来的邮箱地址。
当管理员致力于阻止危险邮件通过知名软件的识别时,那些病毒制造者又在利用其他途径来回避这种保护,可执行文件被重新命名为批处理文件或dos文件加上一系列扩展名,将仍旧成功地感染终端使用者,黑客们经常会努力发一些看起来像动画电影的附件来进入网络,这些附件可以一边展现极具吸引力的动画制作技术,一边暗地里执行一些命令来获取你的密码,并安装一个炸弹进入你的网络。
【正确答案】 B
【答案解析】
【正确答案】 D
【答案解析】
【正确答案】 C
【答案解析】
【正确答案】 A
【答案解析】