Question 25. A. create B. to creating C. created D. creating
Đề bài
Question 25. A. create B. to creating C. created D. creating
Question 25. A. create B. to creating C. created D. creating
Đề bài
Question 9.
A. regardless of
B. on top of
C. in view of
D. in spite of
Đề bài
Question 10.
A. integrations
B. applications
C. components
D. distributions
Đề bài
Question 11.
A. modifications
B. interferences
C. discrepancies
D. innovations
Đề bài
Read the following passage about the urban shift and mark the letter A, B, C or D on your answer sheet to indicate the best answer to each of the following questions.
[I] In an increasingly digital world, the threat posed by virus writers and hackers is ever-present. [II] These individuals use their skills to exploit vulnerabilities in computer systems, often leading to significant financial and personal information loss. [III] Virus writers create malicious software - viruses, worms, and ransomware - to infiltrate systems, whereas hackers might break into systems for various motives, including curiosity, financial gain, or political activism. Understanding their methods is crucial in mitigating risks. [IV]
Typically, virus writers operate by identifying security flaws in software and systems. Once a vulnerability is found, they design code that can infect devices, often propagating through networks or external devices. Hackers, meanwhile, may use similar tactics but often engage in more extensive infiltration activities, stealing sensitive data instead of merely causing disruption.
Protection against these threats involves not only technical measures, such as firewalls and antivirus software, but also awareness and education among users. By recognizing suspicious behaviors, such as unsolicited emails or unfamiliar software installations, individuals can protect themselves from potential attacks.
Ultimately, as technology evolves, so too must our strategies for defending against these cyber adversaries. Understanding the motivations and techniques of virus writers and hackers can empower individuals and organizations to take proactive measures in safeguarding their digital environments.
Question 12. Where in the passage 1 does the following sentence best fit?
"Many hackers also engage in ethical hacking to help organizations enhance their security."
A. [III]
B. [I]
C. [IV]
D. [II]
Đề bài
Question 13. The phrase "exploit vulnerabilities" in paragraph 1 could be best replaced by ____________.
A. patch weaknesses
B. analyze risks
C. create loopholes
D. take advantage of
Đề bài
Question 14. The word "propagating" in paragraph 2 refers to ____________.
A. spreading
B. deleting
C. developing
D. causing harm
Đề bài
Question 30. The word “them” in paragraph 2 refers to ____________.
A. needs
B. students
C. teachers
D. colleagues
Đề bài
Question 31. The word “convey” in paragraph 2 can be best replaced by ____________.
A. express
B. conduct
C. brainstorm
D. respect
Đề bài
Question 32. Which of the following best paraphrases the underlined sentence in paragraph 3?
Healthcare professionals must have sufficient medical knowledge to diagnose and treat patients accurately.
A. Proper diagnosis and treatment require medical workers to have adequate medical expertise.
B. To examine and treat patients better, medical staff must have excellent soft skills.
C. Full medical knowledge is the most basic requirement of every healthcare employee.
D. Medical workers must learn all life long to keep their knowledge up to date and improve skills.
Đề bài
Question 29. The word “solid” in paragraph 3 is OPPOSITE in meaning to ____________.
A. unreliable
B. doubtful
C. increased
D. strong