2024考研一对一
圣才VIP会员,电子书题库视频免费看
您现在的位置: 圣才考研网 > 模拟试题

考研英语(二)阅读模拟试题及答案03

扫码手机阅读
用圣才电子书APP或微信扫一扫,在手机上阅读本文,也可分享给你的朋友。
评论(0
 

  台上十分钟,台下十年功。考研英语也是如此,考场的180分钟,全是平时的学习、阅读、练习一点一滴积累起来。圣才考研网收集了考研英语的模拟试题,以下是2017考研英语(二)阅读模拟试题及答案03。


  It is a devastating prospect. Terrorists electronically break into the computers that control the water supply of a large American city, open and close valves to contaminate the water with untreated sewage or toxic chemicals, and then release it in a devastating flood. As the emergency services struggle to respond, the terrorists strike again, shutting down the telephone network and electrical power grid with just a few mouse clicks. Businesses are paralysed, hospitals are overwhelmed and roads are gridlocked as people try to flee.


  This kind of scenario is invoked by doom-mongers who insist that stepping up physical security since the September 11th attacks is not enough. Road-blocks and soldiers around power stations cannot prevent digital terrorism. “Until we secure our cyber-infrastructure, a few keystrokes and an Internet connection is all one needs to disable the economy and endanger lives,” Lamar Smith, a Texas congressman, told a judiciary committee in February. He ended with his catchphrase: “A mouse can be just as dangerous as a bullet or a bomb.” Is he right?


  It is true that utility companies and other operators of critical infrastructure are increasingly connected to the Internet. But just because an electricity company's customers can pay their bills online, it does not necessarily follow that the company's critical control systems are vulnerable to attack. Control systems are usually kept entirely separate from other systems, for good reason. They tend to be obscure, old-fashioned systems that are incompatible with Internet technology anyhow. Even authorised users require specialist knowledge to operate them. And telecoms firms, hospitals and businesses usually have contingency plans to deal with power failures or flooding.


  A simulation carried out in August by the United States Naval War College in conjunction with Gartner, a consultancy, concluded that an “electronic Pearl Harbour” attack on America's critical infrastructure could indeed cause serious disruption, but would first need five years of preparation and $200mof funding. There are far simpler and less costly ways to attack critical infrastructure, from hoax phone calls to truck bombs and hijacked airliners.


  On September 18th Richard Clarke, America's cyber-security tsar, unveiled his long-awaited blueprint for securing critical infrastructure from digital attacks. It was a bit of a damp squib, making no firm recommendations and proposing no new regulation or legislation. But its lily-livered approach might, in fact, be the right one. When a risk has been overstated, inaction may be the best policy.


  It is difficult to avoid comparisons with the “millennium bug” and the predictions of widespread computer chaos arising from the change of date to the year 2000. Then, as now, the alarm was sounded by technology vendors and consultants, who stood to gain from scare-mongering. But Ross Anderson, a computer scientist at Cambridge University, prefers to draw an analogy with the environmental lobby. Like eco-warriors, he observes, those in the security industry——be they vendors trying to boost sales, academics chasing grants, or politicians looking for bigger budgets——have a built-in incentive to overstate the risks.


  1. We learn from the first paragraph that ____________.


  [A] terrorists could plunge a large American city into chaos through electronic attack


  [B] American people have no experience in dealing with terrorists


  [C] the computer systems of utility companies are rather vulnerable


  [D] the response of emergency services is far from satisfactory


  2. Speaking of the doom-mongers, the author implies that_____________.


  [A] their worries are quite reasonable


  [B] their warnings should be taken seriously


  [C] they exaggerate the threat utility companies are facing


  [D] they are familiar with they way terrorists strike


  3. In the view of Gartner consultant, ___________.


  [A] terrorists may launch another “Pearl Harbor” attack


  [B] terrorists have ample capital and time to prepare a stunning strike


  [C] it is very costly and time-consuming to attack critical infrastructure


  [D] it is unlikely that terrorists would resort to electronic means to attack critical infrastructure


  4.“Lily-livered approach” (Line 4, Paragraph 5) probably means an approach


  characterized by________.


  [A] flexibility


  [B] boldness


  [C] cowardice


  [D] conservatism


  5. We learn from the last paragraph that__________.


  [A] the computer industry suffered heavy loss due to the “millennium bug”


  [B] doom-mongers care more about their own interests than national security


  [C] computer scientists have better judgment than doom-mongers


  [D] environmentalists are criticized for their efforts of protecting environment


  答案:ACDCB



  最新推荐:2016年考研成绩查询时间汇总(含34所高校) 

       2016年考研真题解析免费直播课

       2017年考研报考指南专题

 

  相关推荐:

  点击查看>>>2016年考研复试调剂指导专题

  点击查看 >>>2016年考研成绩查询专题

  点击查看 >>>2016年考研真题汇总

 


 
  
  点击查看 >>>2017 考研动态 复试信息应试指导 经验心得 等。更多考研信息,敬请关注圣才考研网  
 

考研考博类电子书(题库)

查看全部>>

小编工资已与此挂钩!一一分钱!求打赏↓ ↓ ↓

如果你喜欢本文章,请赐赏:

已赐赏的人
最新评论(共0条)评论一句