Reading Comprehension Test 7 Welcome to your Reading Comprehension Test 7 Name Email DIRECTIONS (Qs. 1-5): Read the following passage carefully and answer the questions given below it. Over a couple of days in February, hundreds of thousands of point-of-sale printers in restaurants around the world began behaving strangely. Some churned out bizarre pictures of computers and giant robots signed, “with love from the hacker God himself”. Some informed their owners that, “YOUR PRINTER HAS BEEN PWND’D”. Some told them, “For the love of God, please close this port”. When the hacker God gave an interview to Motherboard, a technology website, he claimed to be a British secondary-school pupil by the name of “Stack over flow in”. Annoyed by the parlous state of computer security, he had, he claimed, decided to perform a public service by demonstrating just how easy it was to seize control. Not all hackers are so public-spirited, and 2016 was a bonanza for those who are not. In February of that year cyber-crooks stole $81m directly from the central bank of Bangladesh—and would have got away with more were it not for a crucial typo. In August America’s National Security Agency (NSA) saw its own hacking tools leaked all over the internet by a group calling themselves the Shadow Brokers. (The CIA suffered a similar indignity this March.) In October a piece of software called Mirai was used to flood Dyn, an internet infrastructure company, with so much meaningless traffic that websites such as Twitter and Reddit were made inaccessible to many users. And the hacking of the Democratic National Committee’s e-mail servers and the subsequent leaking of embarrassing communications seems to have been part of an attempt to influence the outcome of the American elections. Away from matters of great scale and grand strategy, most hacking is either show-off vandalism or simply criminal. It is also increasingly easy. Obscure forums oil the trade in stolen credit card details, sold in batches of thousands at a time. Data-dealers hawk “exploits”: flaws in code that allow malicious attackers to subvert systems. You can also buy “ransomware”, with which to encrypt photos and documents on victims’ computers before charging them for the key that will unscramble the data. So sophisticated are these facilitating markets that coding skills are now entirely optional. Botnets—flocks of compromised computers created by software like Mirai, which can then be used to flood websites with traffic, knocking them offline until a ransom is paid— can be rented by the hour. Just like a legitimate business, the botherders will, for a few dollars extra, provide technical support if anything goes wrong. The total cost of all this hacking is anyone’s guess (most small attacks, and many big ones, go unreported). But all agree it is likely to rise, because the scope for malice is about to expand remarkably. “We are building a world-sized robot,” says Bruce Schneier, a security analyst, in the shape of the “Internet of Things”. The IOT is a buzz-phrase used to describe the computerisation of everything from cars and electricity meters to children’s toys, medical devices and light bulbs. In 2015 a group of computer-security researchers demonstrated that it was possible to take remote control of certain Jeep cars. When the Mirai malware is used to build a botnet it seeks out devices such as video recorders and webcams; the botnet for fridges is just around the corner. None 1. Which is the most appropriate title? (a) Public spirited hackers. (b) Broken Computer security. (c) Hacking: The criminal offence (d) The Internet of Things (e) The Growing Artificial Intelligence None 2. According to the paragraph, why did ‘the hacker god’ decide to perform a public service? (a) To hack the NSA server (b) To show to the people that hacking was very easy (c) To influence the outcome of the American elections (d) To aware the people about the computer security threats (e) None of these None 3. Which of the following is false in context of the passage? (a) The IoT is a buzz-phrase used to describe the computerisation of everything from cars and electricity meters to children’s toys, medical devices and light bulbs. (b) The hacking of the Democratic National Committee’s e-mail servers was performed with the help of a malware named “Mirai” (c) A group called “the Shadow Brokers” leaked hacking tools of America’s National Security Agency all over the internet (d) Obscure forums oil the trade in stolen credit-card details, sold in batches of thousands at a time. (e) All of them are true None 4. According to the paragraph, what caused the websites like ‘twitter and reddit’ inaccessible to the users? (a) It was caused due to hacking the security contents of the website. (b) Due to unscramble of the encrypted Data on the websites. (c) Due to Dyn, an internet infrastructure company. (d) Due to surge in the worthless traffic which was forced by the hackers. (e) All are correct. None 5. Which of the following statement(s) is/are correct about ‘Internet of Things’ according to passage? (i) To take remote control of all digital devices.(ii) A world sized Robot.(iii) It means computerization of everything. (a) Only (i) is correct (b) Only (ii) is correct (c) Both (i) and (iii) are correct (d) Both (ii) and (iii) are correct (e) All are correct None Time's up