软考在线  |  计算机技术与软件专业技术资格(水平)考试   |   [请选择科目]
[ 成为 VIP会员 ]        登录  |  注册      我的  购物车
 
科目切换  联系我们 
    
  |   [请选择科目]

VIP:有效提升20分!  真题  历年真题 (可免费开通)/  百科全书/ 机考模拟平台/  最难真题榜/  自测/  攻打黄金十二宫/  真题检索/  真题下载/  真题词库
知识   必会知识榜/  最难知识榜/  知识点查询/      文档   学习计划/  精华笔记/  试题文档     纸质图书   《百科全书》HOT!!/         /        首页/  2025年上半年专区/  手机版/ 
免费智能真题库 > 历年试卷 > 信息安全工程师 > 2021年下半年 信息安全工程师 上午试卷 综合知识
  第72题      
  知识点:   数据加密
  章/节:   网络攻击常见技术方法       

 
Methods for(71)people differ significantly from those for authenticating machines and programs, and this is because of the major differences in the capabilities of people versus computers.Computers are great at doing(72)calculations quickly and correctly, and they have large memories into which they can store and later retrieve Gigabytes of information. Hu nans don't.So we need to use different methods to authenticate people.In particular,the(73)protocols we've already discussed are not well suited if the principal being authenticated is a person (with all the associated limitations).
All approaches for human authentication rely on at least one ofthe following:
1.Something you know(eg. a password).This is the most common kind of authentication used for humans. We use passwords every day to access our systems.Unfortunately something that you know can become something you just forgot. And ifyou write it down, then other people might find it.
2.Something you(74)(eg. a smart card).This form ofhuman authent cation removes the problem of forgetting something you knowbut some object now must be with you any time you want to be authenticated.And such an object might be stolen and then becomes something the attacker has.
3.Something you are (eg.a fingerprint).Base authentication on something(75)to the principal being authenticated.It's much harder to lose a fingerprint than a wallet.Unfortunately,biometric sensors are fairly expensive and(at present)not very accurate.
 
 
  A.  much
 
  B.  huge
 
  C.  large
 
  D.  big
 
 
 确定 并 查看答案解析     知识点讲解  我要标记      有奖找茬      上一题        下一题 
 

 
  第71题    2022年下半年  
   86%
Perhaps the most obvious difference between private-key andpublic-key encryption is that the former assumes complete sec..
  第62题    2023年下半年  
   0%
目前网络安全形势日趋复杂,攻击手段和攻击工具层出不穷,攻击工具日益先进, 攻击者需要的技能日趋下降。以下关于网络攻防的描述..
  第72题    2023年下半年  
   0%
Perhaps the most obvious difference between private-key andpublic-key encryption is that the former assumes complete sec..
   知识点讲解    
   · 数据加密
 
       数据加密
        网络攻击者常常采用数据加密技术来逃避网络安全管理人员的追踪。加密使网络攻击者的数据得到有效保护,即使网络安全管理人员得到这些加密的数据,没有密钥也无法读懂,这样就实现了攻击者的自身保护。攻击者的安全原则是,任何与攻击有关的内容都必须加密或者立刻销毁。
   题号导航      2021年下半年 信息安全工程师 上午试卷 综合知识   本试卷我的完整做题情况  
1 /
2 /
3 /
4 /
5 /
6 /
7 /
8 /
9 /
10 /
11 /
12 /
13 /
14 /
15 /
 
16 /
17 /
18 /
19 /
20 /
21 /
22 /
23 /
24 /
25 /
26 /
27 /
28 /
29 /
30 /
 
31 /
32 /
33 /
34 /
35 /
36 /
37 /
38 /
39 /
40 /
41 /
42 /
43 /
44 /
45 /
 
46 /
47 /
48 /
49 /
50 /
51 /
52 /
53 /
54 /
55 /
56 /
57 /
58 /
59 /
60 /
 
61 /
62 /
63 /
64 /
65 /
66 /
67 /
68 /
69 /
70 /
71 /
72 /
73 /
74 /
75 /
 
第72题    在手机中做本题
    在线人数   共计 5145人 在线 
    523179420@..     xuexiuli12..     wytoansong..     mise.love@..     xiaoxiaoyu..     cyryx@126...
    jxncfengti..     rh_hyd@hot..     hsl010@126..     zhuangying..     SUNMDZJ@YA..     zuohanqi@1..
    cxsz111111..     xie_hm@163..     liuwei8206..     zhangwodee..     tuchf@icca..     szphjs@163..
    dishou@163..     wdingxinwe..     xiangqian2..     zhouyanhui..     suny0645@s..     5742188si@..
    asdfoooo40..     1546929@qq..     zhoubin123..     mrgmrg@sin..     pangdong.2..     zqc2008.go..
    dy780922@1..     408718571@..     yzgyjf@126..     plsco@163...     kairos_lea..     zhaoq0528@..
    liumh@zhen..     lxpxueping..     zhao_si_xi..     showecn@gm..     jwf125@126..     chenwangen..

本网站所有产品设计(包括造型,颜色,图案,观感,文字,产品,内容),功能及其展示形式,均已受版权或产权保护。
任何公司及个人不得以任何方式复制部分或全部,违者将依法追究责任,特此声明。
本站部分内容来自互联网或由会员上传,版权归原作者所有。如有问题,请及时联系我们。



京B2-20210865 | 京ICP备2020040059号-5 |京公网安备 11010502032051号 | 营业执照 | Copyright ©2000-2025 All Rights Reserved 软考在线版权所有