刷题刷出新高度,偷偷领先!偷偷领先!偷偷领先! 关注我们,悄悄成为最优秀的自己!

单选题

Methods for (1) people differ significantly from those for authenticating machines and programs,and this is because of the major differences in the capabilities of people versus computers. Computers are great at doing (2) calculations quickly and correctly,and they have large memories into which they can store and later retrieve Gigabytes of information. Humans don't. So we need to use different methods to authenticate people. In particular,the (3) protocols we've already discussed are not well suited if the principal being authenticated is a person (with all the associated limitations).

All approaches for human authentication rely on at least one of the following:

√Something you know (eg. a password).This is the most common kind of authentication used for humans. We use passwords every day to access our systems. Unfortunately,something that you know can become something you just forgot. And if you write it down,then other people might find it.

√Something you (4) (eg. a smart card).This form of human authentication removes the problem of forgetting something you know,but some object now must be with you any time you want to be authenticated. And such an object might be stolen and then becomes something the attacker has.

√Something you are (eg. a fingerprint).Base authentication on something (5) to the principal being authenticated. It's much harder to lose a fingerprint than a wallet. Unfortunately,biometric sensors are fairly expensive and (at present)not very accurate.

A
are
B
have 
C
can
D
owned
使用微信搜索喵呜刷题,轻松应对考试!

答案:

B

解析:

根据文章内容,人们在身份验证时依赖于他们所拥有的东西,如智能卡等,因此选项B “have” 是正确的。文章提到这种形式的人类身份验证避免了遗忘所知道的东西的问题,但必须有物体随身携带,因此人们拥有的东西成为身份验证的一部分。

创作类型:
原创

本文链接:Methods for (1) people differ significantly from t

版权声明:本站点所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议。转载请注明文章出处。

让学习像火箭一样快速,微信扫码,获取考试解析、体验刷题服务,开启你的学习加速器!

分享考题
share