問題詳情
Passage 2: Questions 46-50 Nowadays, most people realize that it’s risky to use credit card numbers online. However, fromtime to time, we all use passwords and government ID numbers on the Web. We think we are safe,but that may not be true! A new kind of attack is being used by dishonest people to steal IDs andcredit card numbers from innocent websurfers This new kind of attack is called “phishing.” Phishing sounds the same as the word “fishing,”and it implies a thief is trying to lure people into giving away valuable information. How canphishers lure people to do this? Like real fishermen, they use bait in the form of great online dealsor services. For example, phishers might use fake emails and false websites to con people intorevealing credit card numbers, account usernames, and passwords. They imitate well-known banks,online sellers, and credit card companies. Successful phishers may convince as many as 5 percent ofthe people they contact to respond and give away their personal financial information. Is this really a big problem? Actually, tricking 5 percent of the online population is huge!Currently, more than 350 million people have access to the Internet, and 75 percent of those Internetusers live in the wealthiest countries on Earth. It has been estimated that phishers send more than 3billion scam messages each year. Even by tricking only 5 percent of the people, phishers can make alot of money. Since there is so much money to make through this kind of scam, it has caught the interest ofmore than just small-time crooks. Recently, police tracked down members of an organized phishinggroup in Eastern Europe who had stolen hundreds of thousands of dollars from people online. Thegroup created official-looking email messages requesting people to update their personalinformation at an international bank’s website. However, the link to the bank in the messageactually sent people to the phishers’ fake website. To make matters worse, further investigationrevealed that this group had connections with a major crime gang in Russia. How can innocent websurfers protect themselves? Above all, they have to learn to recognizeemail that has been sent by a phisher. Always be wary of any email with urgent requests forpersonal financial information. Phishers typically write upsetting or exciting (but fake) statementsin their emails so that people will reply right away. Also, messages from phishers will not addressrecipients by name because they really don’t know who the recipients are yet. On the other hand,valid messages from your bank or other companies you normally deal with typically include yourpersonal name.
46. To which activity is phishing compared?
(A) Catching fish
(B) Collecting antiques
(C) Looking for treasures
(D) Meeting friends
(E) Playing online games
46. To which activity is phishing compared?
(A) Catching fish
(B) Collecting antiques
(C) Looking for treasures
(D) Meeting friends
(E) Playing online games
參考答案
答案:A
難度:適中0.5
統計:A(0),B(0),C(0),D(0),E(0)
內容推薦
- 有關流動性危機與流動性風險的敘述,下列何者錯誤?(A)銀行對外籌措資金窒礙難行時,流動性風險即明顯提高(B)當銀行的擠兌風險一發不可收拾時,擴散效果將逐步蔓延至其他金融機構,殃及該地區的金融市場
- 一、為強化公司治理,金融監督管理委員會規劃「新版公司治理藍圖(2018~2020)」,其中有一計畫項目為:深化公司治理及企業社會責任文化。請詳述:【題組】⑴何謂公司治理?(10 分)
- 銀行資產負債部位的特性不同,其持有水準與波動情況也會有所差異,有關利率風險管理的重新訂價缺口的監督,下列敘述何者錯誤?(A)類似流動性缺口指標是以不同天期「累計」概念衡量(B)實務上,利率風險的
- 四、閱讀測驗:請依據文章內容,選出最適當的答案。 Passage 1: Questions 41-45 Have you heard or read stories about people
- 2011 年 10 月起,台灣的流動準備法定比率是多少?(A) 7% (B) 9% (C) 10% (D) 12%
- 【題組】What is the main idea of this passage?(A) Music therapy has become a common and mainstream t
- 【題組】(A) at (B) on (C) of (D) with (E) up
- 衡量市場風險時,有關主要部位或個別金融商品的「價格波動」,是指市場因素在特定時間內,上下偏離平均水準,導致部位價值產生變動的程度,在統計學上稱為部位價值的變動率,此波動程度之衡量不包括下列何者?
- 金管會「銀行資本適足性及資本等級管理辦法」第 2 條第 4 項,定義「資本適足率」,係以下列何者除以風險性資產總額而得?(A)第一類資本淨額(B)第二類資本淨額(C)第三類資本淨額(D)第一類資
- 【題組】(A) vessel (B) file (C) shade (D) prejudice (E) passion
內容推薦
- 王老師問班上學生要玩什麼遊戲,她說完七個遊戲的名稱之後,學生只記得前面兩個遊戲名稱。學生的記憶受到什麼效應的影響?(A)感官效應 (B)新近效應 (C)初始效應 (D)月暈效應
- 趙老師與學生討論作弊問題,多位學生表示:「作弊如果被抓到,會被同學在背後指指點點」。根據柯柏格(L. Kohlberg)的道德認知發展論,這些學生的道德發展是下列哪一取向?(A)避罰服從取向 (
- 下列何者的主張認為,家庭的背景或品味是造成社會不平等的重要因素?(A)衛里斯(P. Willis)的文化創生 (B)布迪爾(P. Bourdieu)的文化資本(C)涂爾幹(E. Durkheim
- 不同學派對於師生關係有不同的論述,主張師生的關係並非既定的,是互動的結果,這是哪一學派的主張?(A)結構功能論 (B)衝突理論(C)符號互動論 (D)批判理論
- 彼德思(R.S.Peters)提出的學校教育之三大規準為何?(A)合文化性、合社會性、合實用性 (B)合真實性、合良善性、合審美性(C)合認知性、合情意性、合技能性 (D)合價值性、合認知性、合
- 陳老師主張打破科目之間的界線,並與學生建立較為平等的關係。他的理念較屬於伯恩斯坦(B. Bernstein)的哪一種類型?(A)弱分類與弱架構 (B)弱分類與強架構(C)強分類與弱架構 (D)強
- 以下何者屬於「微觀教育社會學」(micro-sociology of education)的研究主題?(A)再製(reproduction) (B)互動(interaction)(C)符應(co
- 關於解釋取向的教育社會學研究,下列何者為其基本觀點?(A)社會真實是固定的 (B)人類行為具有預測性(C)透過實驗研究能掌握行為的意義 (D)人類透過互動建構意義
- 美學和倫理學是屬於哲學的哪一個範疇?(A)知識論 (B)形上學 (C)價值論 (D)本體論
- 下列何者是功績主義(meritocracy)對學校的假設?(A)個人的地位來自於繼承(B)學校會促進社會再製(C)個人在學校的成就是依據努力與能力而定(D)個人的工作酬賞與在校的成就無關
- 【題組】What is implied about the people who get caught in phishing scams?(A) Few of them have jobs.
- 小安平日上課無法專心聽課太久,媽媽帶他去看兒科醫師。醫生檢查後,告知媽媽一切正常,並說小安不能專心的現象會隨其成長而改善。下列哪一項生理改變最能支持醫生的觀點?(A)杏仁核(amygdala)會隨
- 下列哪一個語句,並非出於孔子?(A)性相近也,習相遠也 (B)我非生而知之者 (C)教也者,上所施下所效 (D)不憤不啟,不悱不發
- 提出「哲學是教育的普遍原理,教育是哲學的實驗室」的教育家是:(A)羅素 (B)杜威 (C)洛克 (D)康德
- 在工業化社會底下,勞工在生產線上都只從事一種生產活動,像機器一樣,聽令做事,這導致了哪一種現象?(A)濡化 (B)涵化 (C)異化 (D)反文化
- 【題組】According to the reading, who was behind the Eastern European phishing scam?(A) A bank emplo
- 五年級的阿福對犬貓科動物有強烈恐懼感,謝老師設計了一系列情境(包括注視犬貓照片與模型等)引導他漸進地降低其恐懼感。過程中謝老師也教導阿福進行肌肉鬆弛等活動。謝老師運用了下列何種輔導方法?(A)交
- 小強第一次看到媽媽買回來的青色酪梨以為是芭樂,可是切開後發現果肉及味道都和原來的想像不一樣。經進一步探索,終於認識了這種水果。此過程稱為下列何者?(A)同化(assimilation) (B)組織
- 下列敘述中, 哪一項是關於精粹主義(Essentialism)的教育主張?(A)學校課程應培養批判思考 (B)學校教育應重視學生的需求及興趣(C)學校教育必須重視經典教育 (D)以上皆非。
- 關於《愛彌兒》這本教育經典名著,下列敘述何者正確?(A)作者是洛克 (B)倡導回歸自然的教育理念 (C)文體是對話錄 (D)大力倡導女權。
- 下列教育現象的敘述,何者屬於結構功能論(structural-functionalism)取向?(A)學校教育在為資本主義服務(B)師生之間存在制度化的「支配─從屬」(dominance and
- 下列何種身體系統的成長速率,在兒童後期遠超越成人期,卻在青春期開始又迅速下降?(A)骨骼系統(B)淋巴系統(C)肌肉系統(D)生殖系統
- 小明接受魏氏兒童智力測驗的結果,其全量表的Z分數為2,試問小明的離差智商(DIQ)是多少?(A)128(B)130(C)132(D)134
- 依照我國現行規定,國民中小學的學年之起始日為下列何者?(A)每年的一月一日 (B)每年的七月一日(C)每年的八月一日 (D)每年的九月一日
- 下列哪一項敘述與美國教育家杜威無關?(A)提出教育應防範惰性概念 (B)強調做中學(C)指出教育即生活 (D)提倡道德教育應融入各科教學。