探索者的羽翼在线观看未删减完整版|人间**未删减版电影在线观看完整版|在线观看国产欧美|青在线视频,色戒电影完整版视频在线观看,芈月传电视剧全集在线观看免费版,奇米影音第四色

軟題庫 學(xué)習(xí)課程
當(dāng)前位置:信管網(wǎng) >> 在線考試中心 >> 信息安全工程師題庫 >> 試題查看
試卷名稱
考試中心《》在線考試
試卷年份2021年下半年
試題題型【單選題】
試題內(nèi)容

Methods for (71)people differ significantly from those for authenticating machines and programs, and this is because of the major differences in the capabilities of people versus computers.Computers are great at doing(72) calculations quickly and correctly, and they have large memories into which they can store and later retrieve Gigabytes of information. Humans don't. So we need to use different methods to authenticate people. In particular, the(73) protocols we've already discussed are not well suited if the principal being authenticated is a person (with all the associated limitations).
All approaches for human authentication rely on at least one of the followings:

Something you know (eg. a password).This is the most common kind of authentication used for humans.We use passwords every day to access our systems. Unfortunately,something that you know can become something you just forgot. And if you write it down, then other people might find it.
Something you(74)(eg.a smart card).This form of human authentication removes the problem of forgetting something you know, but some object now must be with you any time you want to be authenticated. And such an object might be stolen and then becomes something the attacker has.
Something you are (eg. a fingerprint).Base authentication on something (75)to the principal being authenticated. It's much harder to lose a fingerprint than a wallet. Unfortunately,biometric sensors are fairly expensive and (at present) not very accurate.

71
A.a(chǎn)uthenticating
B.a(chǎn)uthentication
C.a(chǎn)uthorizing
D.a(chǎn)uthorization
72
A.much
B.huge
C.large
D.big
73
A.network
B.cryptographic
C.communication
D.security
74
A.a(chǎn)re
B.have
C.can
D.owned
75
A.unique
B.expensive
C.important

D.intrinsic

查看答案

相關(guān)試題



更多試題