PDF Google Drive Downloader v1.1


Report a problem

Content text [GV] ĐỀ 21 - A. ĐỀ THI.docx

1 BỘ ĐỀ THI NÂNG CAO B2-C2 ĐỀ THI THỬ SỐ 21 (Đề thi có 7 trang) KỲ THI TỐT NGHIỆP TRUNG HỌC PHỔ THÔNG Môn thi: TIẾNG ANH Thời gian làm bài: 50 phút, không kể thời gian phát đề Họ, tên thí sinh: …………………………………………… Số báo danh: ………………………………………………. Mã đề: 1126 Read the following article and mark the letter A, B, C, or D to indicate the correct option that best fits each of the numbered blanks from 1 to 6. Personal data at risk rarely vanish without consequence; they reverberate across credit markets and everyday transactions. Following a confirmed breach at a national credit information hub, investigators reported signs of (1) _______ access and systematic exfiltration of identifiers. The incident, which authorities (2) _______ under emergency protocols since last week, prompted coordinated forensics with major cybersecurity vendors to delimit impact and harden perimeters. While containment teams triage logs, regulators have urged citizens to avoid downloading any material that (3) _______ from questionable repositories, however tempting the sensational leaks may seem. To fortify resilience, agencies circulated advisories to banks and payment processors, insisting on expedited patching cycles, stricter vendor screening, and scrupulously transparent incident reporting that prioritises timeliness (4) _______ reputational anxieties. Public notices, (5) _______ emphasise scam patterns and phishing heuristics, aim to inoculate users against socialengineering cascades. Meanwhile, digitalrights advocates argue that only by enforcing privacybydesign and minimising data retention can systems reduce the blast radius when – not if – intrusions occur. As evidence is archived for legal action, engineers are still sifting through anomalous sessions to determine which records were actually siphoned and to (6) _______ any lingering footholds left by the adversaries. (Adapted from Viet Nam News, “National credit info centre hacked, personal data at risk”) Question 1. A. legitimate B. unauthorised C. discretionary D. peripheral Question 2. A. were handling B. have been handling C. handle D. had handled Question 3. A. compensates B. derives C. demands D. urges Question 4. A. with B. to C. over D. in Question 5. A. that B. which C. where D. when Question 6. A. gloss over B. root out C. phase in D. roll back Read the following article and mark the letter A, B, C, or D to indicate the correct option that best fits each of the numbered blanks from 7 to 12. Ecommerce has become a springboard for Vietnamese SMEs to internationalise their brands. (7) ________, a footwear label that joined a regional marketplace’s export programmes leveraged logistics integration and localised storefronts to move beyond its home market. The model bundled fulfilment, translation, and payments, reducing fixed costs; (8) ________ this scaffold, the firm concentrated on merchandising and datadriven promotions. After piloting in one country, the team compared dashboards across (9) ________ channel to identify conversion bottlenecks. They then refined creatives around a (10) ________ product assortment that balanced premium cues with massmarket utility. As competition intensified, the brand prioritised (11) ________ engagement – timely replies, candid reviews management, and predictable postpurchase service – to defend loyalty. Ultimately, the playbook scaled when leaders framed crossborder growth as a sequence of measurable hypotheses, each informed by market signals rather than assumptions about a single (12) ________. (Adapted from Viet Nam News, “From Vietnam to Southeast Asia: Erosska’s success story with Shopee”)


Related document

x
Report download errors
Report content



Download file quality is faulty:
Full name:
Email:
Comment
If you encounter an error, problem, .. or have any questions during the download process, please leave a comment below. Thank you.