Pharming is a scamming practice in which malicious code is installed on a personal computer or server,misdirecting users to(请作答此空)Web sites without their knowledge or consent.Pharming has been called"phishing without a lure."In phishing,the perpetrator sends out legitimate-( )E-mails,appearing to come from some of the Web's most popular sites,in ah effort to obtain personal and financial information from individual recipients.But in pharming,larger numbers of computer users can be( )because it is not necessary to target individuals one by one and no conscious action is required on the part of the victim.In one form of pharming attack,code sent in an E-mail modifies local host files on a personal computer.The host files convert URLs into the number strings that the computer uses to access Web sites.A computer with a compromised host file will go to the fake Web site even if a user types in the correct Internet address or clicks on an affected( )entry.Some spyware removal programs can correct the corruption,but it frequently recurs unless the user changes browsing( ).A.fewB.fraudulentC.normalD.structured

Pharming is a scamming practice in which malicious code is installed on a personal computer or server,misdirecting users to(请作答此空)Web sites without their knowledge or consent.Pharming has been called"phishing without a lure."In phishing,the perpetrator sends out legitimate-( )E-mails,appearing to come from some of the Web's most popular sites,in ah effort to obtain personal and financial information from individual recipients.But in pharming,larger numbers of computer users can be( )because it is not necessary to target individuals one by one and no conscious action is required on the part of the victim.In one form of pharming attack,code sent in an E-mail modifies local host files on a personal computer.The host files convert URLs into the number strings that the computer uses to access Web sites.A computer with a compromised host file will go to the fake Web site even if a user types in the correct Internet address or clicks on an affected( )entry.Some spyware removal programs can correct the corruption,but it frequently recurs unless the user changes browsing( ).

A.few
B.fraudulent
C.normal
D.structured

参考解析

解析:无诱饵钓鱼欺骗是一种诡秘的做法,其中恶意代码会装入个人计算机或服务器,在不知不觉中或者未经用户同意就将用户错误地引向骗人的网站。它被叫做“无诱饵钓鱼”。在钓鱼式欺骗中,为了从收信个人那里获得个人和财务信息,作恶者发送似乎是合法的电子邮件,看上去它来自某个最流行的网站。而在无诱饵钓鱼欺骗中,由于它不是一个一个地针对个人,受害方丝毫不会怀疑这些行为,因此会有大量的计算机用户受害。其中一种无诱饵钓鱼欺骗的形式就是,随电子邮件发出的(恶意)代码修改个人计算机上的本机主文件。该主文件将URL转换成计算机访问网站的数码串。拥有修改过的主文件的计算机会去假冒网站,即使用户键入了正确的因特网地址或者点击了受影响的书签条目。有些消除间谍件的程序能纠正此种破坏,但除非用户改变了浏览习惯,否则它还是会频繁发生。

相关考题:

● Spyware and other forms of malware are the biggest online threat to your computer's (71) nowadays. These malicious (72)which get to your PC through freeware, shareware, commercial sites, deceptive pop-ups or in any other way, can record your surfing habits and sites you visit, share your personal information with their partners. Any personal (73), when inwrong hands, can leave you a victim of an "identity theft" by steeling your credit (74)details,birth records and other (75) information.

Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to (71)Web sites without their knowledge or consent. Pharming has been called "phishing without a lure".In phishing, the perpetrator sends out legitimate-(72)e-mails, appearing to come from some of the Web's most popular sites, in an effort to obtain personal and financial information from individual recipients. But in pharming, larger numbers of computer users can be(73)because it is not necessary to target individuals one by one and no conscious action is required on the part of the victim. In one form. of pharming attack, code sent in an e-mail modifies local host files on a personal computer. The host files convert URLs into the number strings that the computer uses to access Web sites. A computer with a compromised host file will go to the fake Web site even if a user types in the correct Internet address or clicks on an affected(74)entry. Some spyware removal programs can correct the corruption, but it frequently recurs unless the user changes browsing( 75 ).A.fewB.fraudulentC.normalD.structured

You are an enterprise administrator for Cer-tech .com. The company runs Windows Server 2008 on all the servers on the network. One of the servers, Server01 has the Web Server (IIS) role installed on it. The Server01 hosts multiple websites. Which of the following options would you choose to configure the server to automatically release memory for a single web site without affecting the other Web sites?()A、Modify the Physical Path Credentials on the virtual directory.B、Modify the bindings for the Web site.C、Modify the Recycling options from the Application Pool Defaults.D、Create a new application pool and associate the Web site to the application pool.

The technician has suspicions that a browser has been hijacked. Which of the following should the technician look for in this situation?()A、A new default gateway has been setup.B、A new Internet shortcut has been added.C、A new web browser has been installed and is now the default.D、A proxy server has been enabled.

An administrator has just installed a web server for the company's Internet site. After bringing the system online, customers notify the administrator that they cannot connect to the server. The administrator tests the web server from a workstation and can access the website. The customers continue to report issues. Which of the following is the MOST likely reason for this?()A、The server's firewall is misconfigured.B、The server's timeout feature is set incorrectly.C、The web server was not installed properly.D、The company firewall is misconfigured.

A computer has been upgraded with a new hard drive and after reassembling the computer and turning the computer on, the drive LED remains lit and an error message during power-on self test (POST) states, ’No Drive Present.’ Which of the following would MOST likely be the cause?()A、The motherboard was damaged and needs replacing.B、The floppy drive was not reconnected.C、A configuration disk was left in the floppy drive.D、The ribbon cable has been installed incorrectly.

An administrator has just installed a web server for the companys Internet site. After bringing the system online, customers notify the administrator that they cannot connect to the server. The administrator tests the web server from a workstation and can access the website. The customers continue to report issues.  Which of the following is the MOST likely reason for this?()A、 The servers firewall is misconfigured.B、 The server’s timeout feature is set incorrectly.C、 The web server was not installed properly.D、 The company firewall is misconfigured.

A customer has just purchased six x346 servers running Windows 2003 Web Edition.They are expecting to add six additional x346’s in three months.They have a requirement to automatically deploy the current server image upon the new servers. What TWO actions are required to complete this task?()A、Ensure Director Agent is installed on the new servers.B、Ensure a DHCP Sever is installed and configured in the environment.C、Ensure Server Plus Pack option has been installed and configured.D、Ensure Software Distribution has been installed on the IBM Director Server and an image has been created.E、Ensure Remote Deployment Manager has been installed on the IBM Director Server and an image has been created.

WebSphere Commerce has been successfully installed and tested.  WebSphere Commerce Analyzer has been installed and the extraction programs have run with no errors but there is no data in any reports when viewed from the WebSphere Commerce Accelerator.  What could be the cause of this problem?()A、The WebSphere Commerce application server was not startedB、The web server was not startedC、SSL has not been configured on the web serverD、The appropriate listeners were not enabled in Configuration ManagerE、The database server was not started

Which of the following is the lowest cost DB2 product that can be legally installed on a Linux server that has 6 CPUs?()A、DB2 Express EditionB、DB2 Personal EditionC、DB2 Workgroup Server EditionD、DB2 Enterprise Server Edition

Your company has an internal Web application that uses a self-signed SSL certificate.  The company has an internal certification authority (CA) with autoenrollment.When users attempt to start the Web application, Internet Explorer displays an error message that recommends closing the Web page rather than continuing to the application.    You need to ensure that Internet Explorer does not display the error message.   What should you do?()A、Issue a certificate from the internal CA and install it on the application serverB、Install the Web application’s certificate into the computer store on each client computerC、Install the Web application’s certificate into the personal store on each client computer. Add the application’s URL to the Trusted Sites zone in Internet ExplorerD、Purchase a commercial certificate and install it on the internal CA

Your network contains a Web server named Server1 that runs Windows Server 2003 and Internet Information Server (IIS). Server1 has a server certificate from an Enterprise Certificate Authority (CA) installed. External users report that when they try to access the Web site from outside the corporate network by using a Web browser, they receive the following warning message: There is a problem with this Web sites security certificate. The security certificate presented by this Web site was not issued by a trusted certificate authority. You find that users onthe corporate network do not receive this error. You need to ensure that external users do not receive the warning message when connecting to Server1.   What should you do?()A、In IIS Manager, enable the Enable client certificate mapping option.B、In IIS Manager, replace the certificate with a certificate obtained from a public Certification Authority.C、In Local Security Policy, enable Domain Member: Require strong (Windows 2000 or later) session key.D、In Local Security Policy, enable Domain Member: Digitally encrypt or sign secure channel data (always).

You are the administrator of an Active Directory domain. All servers run Windows Server 2003.  You configure a server named Server3 as the DNS server for the domain.The company recently started using a new ISP. Since the change to the new ISP occurred, users report that they cannot access Internet Web sites by using their fully qualified domain names (FQDNs).You manually configure a test computer to use the DNS server address of the new ISP. The test computer can successfully access Internet Web sites by using their FQDNs.You need to ensure that network users can access Internet Web sites by using their FQDNs, while ensuring that user access to internal resources is not disrupted.   What are two possible ways to achieve this goal?()A、Create a root zone on Server3.B、Configure Server3 to use the default root hints.C、Configure a forwarder on Server3 to the new ISP’s DNS server.D、Configure all computers on your network to use the new ISP’s DNS server.

You have a server that runs Windows Server 2008. The server has the Web Server (IIS) server role installed and all the Web Server role services installed.  You need to provide a user the ability to administer a Web site. Which feature should you configure?()A、Net RolesB、Net UsersC、AuthenticationD、IIS Manager Permissions

You have a Windows Server 2008 server that has the Web Server (IIS) server role installed. The server contains a Web site.  You need to ensure that the cookies sent from the Web site are encrypted on users computers.  Which Web site feature should you configure?()A、Authorization RulesB、Machine KeyC、Pages And ControlsD、SSL Settings

单选题ABC Corp. is installing 11i Oracle Applications on two nodes A and B. On Node A, it hasinstalled the Forms server, Web server, and Administration server. On Node B, it has installed theConcurrent Processing server. By default, on which node would the Reports server be installed?()ANode ABNode BCneither of the nodesDboth Node A and Node B

单选题An administrator wants to prevent users from plugging in their personal laptops and accessing the Internet without a member of the IT staff configuring the machine first. Which of the following would MOST likely be installed?()AMultilayer switchBCSUCProxy serverDIDS

多选题You are a help desk technician for your company. All users have Windows XP Professional computers. A user named Richard reports that he cannot access www.southridgevideo.com, an Internet Web site, by using Internet Explorer. Whenever Richard types http://www.southridgevideo.com into the Internet Explorer address bar, he receives the following error message: “Your security settings prohibit the display of unsigned ActiveX Controls.” According to company policy, users should download unsigned ActiveX controls only from Internet Web sites that have been approved by the company’s information security department. You verify that www.southridgevideo.com is listed as an approved Web site. On Richard’s computer, you also verify that Internet Explorer is configured with the default settings. You need to ensure that Richard can access www.southridgevideo.com without receiving an error message. You also want to comply with company policy. You need to configure Richard’s computer. First, you open the Security properties for Internet Explorer on Richard’s computer.  Which two actions should you perform next?()AAdd www.southridgevideo.com to the Trusted Sites list.BRemove www.southridgevideo.com from the Restricted Sites list.CIn the Internet zone settings, enable the Allow unsigned ActiveX controls option.DOpen the Local intranet Sites dialog box and clear the Include all network paths check box.EOpen the Trusted Sites dialog box and clear the Require server verification for all sites in this zone check box.FOpen the Intranet Sites dialog box. In Advanced properties, add www.southridgevideo.com to the list of Web sites.

单选题You are a systems administrator responsible for deploying Windows SharePoint Services (WSS) for accessby users from an external business partner. You have installed the appropriate server role and have verified that the SharePoint Web site loads properly from the local server computer. All options are usingtheir installation default values. External users report that they cannot log on to the site. Which of thefollowing changes should you make to resolve the problem?()ACreate a new site within an existing site collection for the external users.BCreate a new site collection for the external users.CChange the authentication mode for the Web application to Forms authentication.DModify the User Permissions For Web Applications settings.

多选题You manage a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. The server hosts an Internet-accessible Web site that has a virtual directory named /orders/. A Web server certificate is installed and an SSL listener has been configured for the Web site. The /orders/ virtual directory must meet the following company policy requirements: Be accessible to authenticated users only. Allow authentication types to support all browsers. Encrypt all authentication traffic by using HTTPS.  All other directories of the Web site must be accessible to anonymous users and be available withoutSSL.  You need to configure the /orders/ virtual directory to meet the company policy requirements.  Which two actions should you perform?()AConfigure the Web site to the Require SSL setting.BConfigure the /orders/ virtual directory to the Require SSL setting.CConfigure the Digest Authentication setting to Enabled for the /orders/ virtual directory.DConfigure the Basic Authentication setting to Enabled and the Anonymous Authentication setting to Disabled for the Web site.EConfigure the Basic Authentication setting to Enabled and the Anonymous Authentication setting to Disabled for the /orders/ virtual directory.

单选题You have a Windows Server 2008 server that has the Web Server (IIS) server role installed. The servercontains a Web site. You need to ensure that the cookies sent from the Web site are encrypted on userscomputers. Which Web site feature should you configure?()AAuthorization RulesBMachine KeyCPages And ControlsDSSL Settings

单选题You have a Windows Server 2008 server that has the Web Server (IIS) server role installed. The server hosts multiple Web sites.  You need to configure the server to automatically release memory for a single Web site. You must achievethis goal without affecting the other Web sites. What should you do?()ACreate a new Web site and edit the bindings for the Web site.BCreate a new application pool and associate the Web site to the application pool.CCreate a new virtual directory and modify the Physical Path Credentials on the virtual directory.DFrom the Application Pool Defaults, modify the Recycling options.

单选题You are a systems administrator who is attempting to troubleshoot a problem with accessing a Web site ona computer running Windows Server 2008. In the past, users have been able to access the Web site byusing http://hr.contoso.com. However, when they attempt to access the site now, they receive the errormessage "Internet Explorer Cannot Display The Web page." Which of the following steps should you taketo resolve the error?()AUsing Server Manager, add the HTTP Errors server role.BUsing Server Manager, verify that the World Wide Web Publishing Service has been started.CVerify the configuration of the usersWeb browsers.DUsing Server Manager, add the HTTP Logging server role.

单选题You have a server that runs Windows Server 2008. The server has the Web Server (IIS) server role installed.   The server contains a Web site that is configured to use only Windows Authentication. You have a security group named Group1 that contains several user accounts.  You need to prevent the members of Group1 from accessing a Web site. You must not prevent other users from accessing the Web site.  Which Web site feature should you configure?()AAuthenticationBAuthorization RulesCIIS Manager PermissionsDSSL Settings

单选题You are the network administrator for Company. You have been assigned the task to create and deploy a standard Windows 2000 Professional image to all 2,500 client computers that today are installed with Windows 98. You log on to a client computer called Company by using a local administrative account called SetupUser and install three Windows 2000 professional compatible software packages on Company. You create an image using third party software. You deploy the image to a test client computer and join the client computer to a domain. You want to create shortcuts on all users' desktops for the software packages you installed. You also want users to have the option to delete the icons.  Which profile must you edit?()AThe SetupUser profileBThe Default User profileCThe Administrator profileDThe System profileEThe All Users profile

多选题You are a systems administrator responsible for managing a Windows Server 2008 Web Server Currently,there are no Web sites configured on the server. You need to configure the server to host two Web applications: Engineering App and Sales App. Both Web applications must be accessible by using HTTPport 80 without the use of host headers. Also, you must protect against problems in one Web applicationaffecting the performance or reliability of the other Web application. Which two steps should you take tomeet these requirements?()ACreate a single Web site that contains both Web applications.BCreate two Web sites, one for each Web application.CAssign both Web applications to the same application pool.DAssign each Web application to its own application pool.

单选题The technician has suspicions that a browser has been hijacked. Which of the following should the technician look for in this situation?()AA new default gateway has been setup.BA new Internet shortcut has been added.CA new web browser has been installed and is now the default.DA proxy server has been enabled.