刷题刷出新高度,偷偷领先!偷偷领先!偷偷领先! 关注我们,悄悄成为最优秀的自己!

单选题

Methods for (1) people differ significantly from those for authenticating machines and programs,and this is because of the major differences in the capabilities of people versus computers. Computers are great at doing (2) calculations quickly and correctly,and they have large memories into which they can store and later retrieve Gigabytes of information. Humans don't. So we need to use different methods to authenticate people. In particular,the (3) protocols we've already discussed are not well suited if the principal being authenticated is a person (with all the associated limitations).

All approaches for human authentication rely on at least one of the following:

√Something you know (eg. a password).This is the most common kind of authentication used for humans. We use passwords every day to access our systems. Unfortunately,something that you know can become something you just forgot. And if you write it down,then other people might find it.

√Something you (4) (eg. a smart card).This form of human authentication removes the problem of forgetting something you know,but some object now must be with you any time you want to be authenticated. And such an object might be stolen and then becomes something the attacker has.

√Something you are (eg. a fingerprint).Base authentication on something (5) to the principal being authenticated. It's much harder to lose a fingerprint than a wallet. Unfortunately,biometric sensors are fairly expensive and (at present)not very accurate.

A
network
B
cryptographic 
C
communication  
D
security
使用微信搜索喵呜刷题,轻松应对考试!

答案:

B

解析:

:根据题目描述,文章主要讨论的是身份验证的方法,特别是人与机器和程序之间的差异,以及为什么我们需要使用不同的方法来验证人的身份。因此,正确答案是D,即安全领域。

2

创作类型:
原创

本文链接:Methods for (1) people differ significantly from t

版权声明:本站点所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议。转载请注明文章出处。

让学习像火箭一样快速,微信扫码,获取考试解析、体验刷题服务,开启你的学习加速器!

分享考题
share