2017年雅思閱讀理解習(xí)題
對(duì)于雅思考生來(lái)說(shuō),備考閱讀理解非常重要,畢竟閱讀理解難度大,而且占據(jù)了較多的分?jǐn)?shù)。下面是小編為大家整理的一篇2017年雅思閱讀理解習(xí)題,希望對(duì)大家有所幫助。
Hackers target the home front
1. One of the UK's leading banks has been forced to admit that organised hacking gangs have been targeting its executives. For the past year, Royal Bank of Scotland has been fighting systematic attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior management. This has included executives up to board level and is now the subject of a separate investigation by the Serious and Organised Crime Agency.
2. The hackers are homing in on the trend for people to work from home. The hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate IT department.
Growing threat
3. For companies it is a growing threat as home working increases: a recent survey from the Equal Opportunities Commission found that more than 60% of the UK's population wants the option of flexible working.
4. And the hackers are employing increasingly sophisticated techniques. Each email they send is meticulously built to make it attractive to its target, who the criminals have carefully researched by trawling the internet for information. Once the email is composed, the malware is just as carefully designed: it is often modified to avoid detection by security software.
5. The keylogger contained in the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user. This means that hackers can, using the usernames and passwords stolen by the keyloggers, connect to VPNs, or Virtual Private Networks, which many companies use to create an encrypted pathway into their networks.
6. Once inside a bank's network, the hackers can communicate directly with computers holding account information and manipulate funds.
7. Has this actually happened? In some cases sources claim that the login details of VPNs have been obtained and used though there has been no confirmation that any losses have occurred as a result. The attacks are not believed to have focused on RBS but to have been across the whole of the banking industry.
8. Royal Bank of Scotland said that the bank had suffered no losses as a result of the attacks and added: "RBS has extremely robust processes in place in order to protect our systems from fraud. Trojan email attacks are an industry-wide issue and are not isolated to a particular area or a particular bank."
9. It is not just banks that have been targets. Last year attempts were made to steal information from the Houses of Parliament using malicious email. Messagelabs, the company responsible for monitoring much of the email traffic of the government and big business for suspect software, said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks.
10. According to Mark Sunner, chief technology officer of Messagelabs, the number of malicious emails targeted at individuals has been increasing. Two years ago they were being seen once every two months, but now they are seeing one or two a day. This has been accompanied by an increase in quality in the creation of Trojans and spyware.
11. "The hackers are now aiming to take over computers, particularly those of home users. Some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off the programs of their competitors."
Increased vigilance
12. Tony Neate, the head of Get Safe Online, a government-funded organisation set up to raise awareness among UK businesses of computer criminals, says: "There is now an attempt to target individuals within UK businesses - including the banking sector. What is happening is that crime is doing what it always does, which is look for the weakest link. Home working is where they perceive a weakness.
13. "This points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home. For home working to be effective, security needs to be as effective as if working in an office."
(667 words)
Questions 1-4 Answer the questions below using NO MORE THAN THREE WORDS from the passage for each answer.
1. What do the hackers use to attack the computer system of the Royal Bank of Scotland?
2. Which word is most likely to be used by hackers to describe home computers?
3. What do the majority of people in the UK prefer?
4. How do hackers collect information so as to compose emails?
5. What do hackers obtain illegally to gain access to banks’ computer network?
Questions 5-12 Complete the sentences below with words from the passage.
Use NO MORE THAN THREE WORDS for each answer.
6. The use of login details of VPNs by criminals does not necessarily result in any ______________.
7. Royal Bank of Scotland claimed that they are not the only victim of ______________.
8. Corporate networks will be another target of hackers with improved _______________.
9. The attacks on individuals have been greatly increased within _______________.
10. With ________________, software used by criminals can eliminate its competing programs.
11. Home users are chosen as a target because they are considered as a __________ .
12. Get Safe Online is calling for an increase in _____________ to ensure safe home working.
Answers Keys:
1.答案:personalised emails/keyloggers (見(jiàn)第1段第2句:For the past year, Royal Bank of Scotland has been fighting systematic attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior management.)
2.答案:vulnerable (見(jiàn)第2段: The hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate IT department. )
3. 答案: flexible working (見(jiàn)第3段: For companies it is a growing threat as home working increases: a recent survey from the Equal Opportunities Commission found that more than 60% of the UK's population wants the option of flexible working.)
4. 答案:trawling (the) internet (見(jiàn)第4段第2句: Each email they send is meticulously built to make it attractive to its target, who the criminals have carefully researched by trawling the internet for information.)
5. 答案: logins and passwords/usernames and passwords (見(jiàn)第5段第第1、2句:The keylogger contained in the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user. This means that hackers can, using the usernames and passwords stolen by the keyloggers, …)
6. 答案: losses (見(jiàn)第7段第2句:In some cases sources claim that the login details of VPNs have been obtained and used though there has been no confirmation that any losses have occurred as a result.)
7. 答案: Trojan email attacks (見(jiàn)第8段最后1句:Trojan email attacks are an industry-wide issue and are not isolated to a particular area or a particular bank.)
8. 答案:techniques (見(jiàn)第9段最后1句: …said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks. )
9. 答案:two years (見(jiàn)第10段第1、2句:According to Mark Sunner, chief technology officer of Messagelabs, the number of malicious emails targeted at individuals has been increasing. Two years ago they were being seen once every two months, but now they are seeing one or two a day.)
10.答案:(an) antivirus system (見(jiàn)第11段: "The hackers are now aiming to take over computers, particularly those of home users. Some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off the programs of their competitors." )
11. 答案:weakness (見(jiàn)第12段最后1句: Home working is where they perceive a weakness. )
12. 答案:vigilance and security (見(jiàn)第13段:"This points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home. For home working to be effective, security needs to be as effective as if working in an office.")
附:雅思閱讀標(biāo)題題如何解題?
讀每段話時(shí),要抓住該段話的主題句和核心詞匯。正確答案常常是主題句的改寫。
讀每段話時(shí),并不是該段落全要仔細(xì)閱讀。這樣,既浪費(fèi)時(shí)間,也不容易抓住重點(diǎn)。應(yīng)該抓住該段話的的主題句。先讀該段話的第一句,然后,與選項(xiàng)列表中大各選項(xiàng)一一對(duì)應(yīng),確定正確答案,正確選項(xiàng)一般就該句話的改寫。如果答案不能確定,應(yīng)再讀該段話的第二句,然后,與選項(xiàng)列表中的各選項(xiàng)一一對(duì)應(yīng)。如果答案還是不能確定,應(yīng)再讀該段話的最后一句,再與選項(xiàng)列表中大各選項(xiàng)一一對(duì)應(yīng)。如果還是找不到正確答案,則就需要閱讀整段話了。根據(jù)統(tǒng)計(jì),段落的主題句在第一句的可能性超過(guò)50%,段落的主題句在第二句的可能性超過(guò)20%,段落的主題句在最后一句的可能性超過(guò)20%。也就是說(shuō),按照上述方法做這種題型,讀完該段話的第一句,就能在選項(xiàng)列表中找出該段話的Heading, 這種可能性超過(guò)50%。整段話都需要閱讀的可能性不到10%。這個(gè)做題方法不僅有統(tǒng)計(jì)數(shù)據(jù)的依據(jù),還有理論的基礎(chǔ)。英文段落展開的方法比較簡(jiǎn)單,主要有兩種:演繹法(deductive method)及歸納法(inductive method)。演繹法指的是由觀點(diǎn)到例子及論據(jù),所以主題句在該段話的第一句,但有時(shí),第一句是個(gè)過(guò)渡性或描述性的句子,主題句有可能放在放在該段話的第二句,總之,主題句在第一句或第二句,都是deductive method.Inductive method 是指由例子及論據(jù)到觀點(diǎn),所以主題句在該段的最后一句,70%左右的段落使用deductive method寫的,而且其中絕大部分主題句在第一句。20%左右的段落是用inductive method寫的。
有的人會(huì)問(wèn):我怎么知道某段話是用演繹法寫的,還是歸納法寫的?是的,不讀完整段話,是不知道的。但讀完整段話,很浪費(fèi)時(shí)間,而且,由于文章句子結(jié)構(gòu)復(fù)雜,再加上有一些不熟悉的單詞,很可能你也讀不太懂。所以,若讀完整段話在來(lái)選擇該段的Heading, 不僅時(shí)間不夠用,而且往往正確率也不高。
上面介紹的方法,就是按照概率,首先認(rèn)為段落是用演繹法寫的,而且主題句在第一句,按照第一句的意思,在選項(xiàng)列表中確定正確答案。如果選項(xiàng)列表中有一項(xiàng)與這句話的意思相同,即可認(rèn)為是正確答案。如果不能確定,再依次讀該段話的第二句和最后一句,再與選項(xiàng)列表中的各選項(xiàng)一一對(duì)應(yīng),確定正確答案。實(shí)踐證明,這種方法不僅節(jié)省時(shí)間,而且正確率也很高。
【雅思閱讀理解習(xí)題】相關(guān)文章:
2017雅思閱讀理解練習(xí)題03-08
2017雅思閱讀理解模擬練習(xí)題05-21
2017雅思閱讀理解強(qiáng)化練習(xí)題07-04
雅思閱讀理解精選試題及答案06-02
如何理解雅思的閱讀詞匯03-29
高中閱讀理解習(xí)題06-17