题目内容:
Questions are based on the following passage.Having to remember multiple passwords may soon be a thing of the past.
Setting the stage for a password-free future, an industry consortium ( 协会) has issueda set of instructions that specify a number of( 1) ways that computers and devicescan confirm a user's (2). The FIDO (Fast IDentity Online) Alliance, which issued thespecifications (规范 ) , is backed by a number of large companies in the IT and bankingindustries, including Microsoft, Google, PayPal, Bank of America, and MasterCard.
After two years of work, FIDO has issued the first (3 )completed drafts of twospecifications. If widely (4), these specifications could form the basis for securingonline communications without using passwords, which are cumbersome ( 麻烦的 ) andcan pose security threats.
The two specifications describe procedures that systems can use to (5 )a person'sidentity. For instance, biometric sensors such as fingerprint readers could identify a user'sidentity. A portable hardware token, which can be carried about, could also be used toauthenticate (认证 ) individuals.
Today, most users log on to secured online services using passwords, yet thisapproach remains6. More than (6) percent of online breaches(7) weak orstolen log-in credentials, according to a survey from Verizon. While other forms ofauthentication such as biometrics have long been (8), there has been little industryconsensus on how these security mechanisms should be implemented, leading to afragmented and complex environment for online authentication management.
Members of the FIDO Alliance are now able to use these specifications to buildsecurity systems. Companies such as Google, PayPal, Samsung and Alibaba have alreadyincorporated ( 包含) early drafts of the specifications into their products and(9)Now that it has finished the core specifications, the FIDO Alliance is working on aset of(10)that will incorporate additional forms of access security, such as establishingidentities using Near Field Communications and Bluetooth wireless communications.
A.ability
B.alternate
C.available
D.classified
E.Deployed
F.exploit
G.Extensions
H.Fully
I.identity
J.Immediately
K.Partially
L.problematic
M.services
N.unrealistic
O.verify
第1题应选()
参考答案:
答案解析: