单选题:Questions are based on the following passage.Having to reme

  • 题目分类:英语六级
  • 题目类型:单选题
  • 查看权限:VIP
题目内容:
Questions are based on the following passage.
Having to remember multiple passwords may soon be a thing of the past.
Setting the stage for a password-free future, an industry consortium ( 协会) has issueda set of instructions that specify a number of( 1) ways that computers and devicescan confirm a user's (2). The FIDO (Fast IDentity Online) Alliance, which issued thespecifications (规范 ) , is backed by a number of large companies in the IT and bankingindustries, including Microsoft, Google, PayPal, Bank of America, and MasterCard.
After two years of work, FIDO has issued the first (3 )completed drafts of twospecifications. If widely (4), these specifications could form the basis for securingonline communications without using passwords, which are cumbersome ( 麻烦的 ) andcan pose security threats.
The two specifications describe procedures that systems can use to (5 )a person'sidentity. For instance, biometric sensors such as fingerprint readers could identify a user'sidentity. A portable hardware token, which can be carried about, could also be used toauthenticate (认证 ) individuals.
Today, most users log on to secured online services using passwords, yet thisapproach remains6. More than (6) percent of online breaches(7) weak orstolen log-in credentials, according to a survey from Verizon. While other forms ofauthentication such as biometrics have long been (8), there has been little industryconsensus on how these security mechanisms should be implemented, leading to afragmented and complex environment for online authentication management.
Members of the FIDO Alliance are now able to use these specifications to buildsecurity systems. Companies such as Google, PayPal, Samsung and Alibaba have alreadyincorporated ( 包含) early drafts of the specifications into their products and(9)Now that it has finished the core specifications, the FIDO Alliance is working on aset of(10)that will incorporate additional forms of access security, such as establishingidentities using Near Field Communications and Bluetooth wireless communications.
A.ability
B.alternate
C.available
D.classified
E.Deployed
F.exploit
G.Extensions
H.Fully
I.identity
J.Immediately
K.Partially
L.problematic
M.services
N.unrealistic
O.verify
第1题应选()
参考答案:
答案解析:

下列对婴儿人工喂养的正确叙述有__________。

下列对婴儿人工喂养的正确叙述有__________。A.因各种原因不能用母乳喂养婴儿时,可采用牛乳、羊乳等动物乳或其他代乳品喂养婴儿,这种非母乳喂养婴儿的方法即

查看答案

影响食品腐败变质发生发展的因素主要包括__________。

影响食品腐败变质发生发展的因素主要包括__________。A.病毒 B.细菌 C.霉菌 D.温度 E.食品成分

查看答案

大豆富含__________,对高血压和动脉粥样硬化患者有益。

大豆富含__________,对高血压和动脉粥样硬化患者有益。A.寡糖 B.植酸 C.卵磷脂 D.蛋白酶抑制剂

查看答案

《中国居民膳食营养素参考摄入量》中乳母能量的RNI是在非孕育龄妇女的基础上增加1000kcal/d。(  )

《中国居民膳食营养素参考摄入量》中乳母能量的RNI是在非孕育龄妇女的基础上增加1000kcal/d。(  )

查看答案

参与式培训的特点包括__________。

参与式培训的特点包括__________。A.趣味性 B.准确性 C.开放性 D.操作性 E.创新性

查看答案