用看的、听的学真题

study by eyes and ears.

  1. 首页
  2. 搜索结果
  3. 知识点列表(3)
  4. 第1页

【信息安全工程师201905】【3-7】

阅读下列说明,回答问题1至问题5,将解答填入答题纸的对应栏内。

【说明】

假设用户A 和用户B为了互相验证对方的身份,设计了如下通信协议:

1.A->B:RA

2.B->A:f(PAB||RA)||RB

3.A->B:f(PAB||)

其中: RA 、RB是随机数, PAB是双方事先约定并共享的口令,“||”表示连接操作。f是哈希函数。

真题详情及解析

【信息安全工程师202011】【61】身份认证是证实客户的真实身份与其所声称的身份是否相符的验证过程。下列各种协议中,不属于身份认证协议的是(61)

真题详情及解析

【信息安全工程师202111】【71-75】Methods for(71)people differ significantly from those for authenticating MAChines and programs, and this is because of the major differences in the capabilities of people versus computers.Computers are great at doing(72)calculations quickly and correctly, and they have large memories into which they can store and later retrieve Gigabytes of information. Humans don't. So we need to use different methods to authenticate people. In particular, the(73)protocols we've already discussed are not well suited if the principal being uthenticated is a person(with all the associated limitations). All approaches for human authentication rely on at least one of the followings:
Something you know (eg. a password).This is the most common kind of authentication used for humans.We use passwords every day to access our systems. Unfortunately,something that you know can become something you just forgot. And if you write it down, then other people might find it.
Something you(74)(eg.a smart card).This form of human authentication removes the problem of forgetting something you know, but some object now must be with you any time you want to be authenticated. And such an object might be stolen and then becomes something the attacker has.
Something you are (eg. a fingerprint).Base authentication on something(75)to the principal being authenticated. It's much harder to lose a fingerprint than a wallet. Unfortunately,biometric sensors are fairly expensive and (at present) not very accurate.

真题详情及解析
广告位