全部科目 > 信息安全工程师 >
2021年下半年 上午试卷 综合知识
第 75 题
知识点 数据加密  
章/节 网络攻击常见技术方法  
 
 
Methods for(71)people differ significantly from those for authenticating machines and programs, and this is because of the major differences in the capabilities of people versus computers.Computers are great at doing(72)calculations quickly and correctly, and they have large memories into which they can store and later retrieve Gigabytes of information. Hu nans don't.So we need to use different methods to authenticate people.In particular,the(73)protocols we've already discussed are not well suited if the principal being authenticated is a person (with all the associated limitations).
All approaches for human authentication rely on at least one ofthe following:
1.Something you know(eg. a password).This is the most common kind of authentication used for humans. We use passwords every day to access our systems.Unfortunately something that you know can become something you just forgot. And ifyou write it down, then other people might find it.
2.Something you(74)(eg. a smart card).This form ofhuman authent cation removes the problem of forgetting something you knowbut some object now must be with you any time you want to be authenticated.And such an object might be stolen and then becomes something the attacker has.
3.Something you are (eg.a fingerprint).Base authentication on something(75)to the principal being authenticated.It's much harder to lose a fingerprint than a wallet.Unfortunately,biometric sensors are fairly expensive and(at present)not very accurate.
 
  A.  unique
 
  B.  expensive
 
  C.  important
 
  D.  intrinsic




 
 
相关试题     网络攻击常见技术方法 

  第14题    2025年下半年  
端口扫描的目的是找出目标系统上提供的服务列表。根据扫描利用的技术不同,端口扫描可以分为完全连接扫描、半连接扫描、SYN扫描、FIN扫描、隐蔽扫描、ACK扫描、N..

  第20题    2025年下半年  
SYN扫描首先向目标主机发送连接请求,当目标主机返回响应后,立即切断连接过程,并查看响应情况。如果目标主机返回(),表示目标主机的该端口开放。

  第9题    2022年下半年  
端口扫描的目的是找出目标系统上提供的服务列表。根据扫描利用的技术不同,端口扫描可以分为完全连接扫描、半连接扫描、SYN扫描、FIN扫描、隐蔽扫描、ACK扫描、N..

 
知识点讲解
· 数据加密
 
        数据加密
        网络攻击者常常采用数据加密技术来逃避网络安全管理人员的追踪。加密使网络攻击者的数据得到有效保护,即使网络安全管理人员得到这些加密的数据,没有密钥也无法读懂,这样就实现了攻击者的自身保护。攻击者的安全原则是,任何与攻击有关的内容都必须加密或者立刻销毁。



更多复习资料
请登录电脑版软考在线 www.rkpass.cn

京B2-20210865 | 京ICP备2020040059号-5
京公网安备 11010502032051号 | 营业执照
 Copyright ©2000-2025 All Rights Reserved
软考在线版权所有