PUBLIC ENGLISH TEST SYSTEM (PETS) LEVEL 3 2017年3月全国英语等级考试第三级笔试真题试卷
SECTION ⅠListening(25 minutes)
答案:BACDA BCDDB CDBBA CDCCD ABAAD
如何打发淡奶油SECTION II Reading (50 minutes ) Part A
Directions: Read the following two texts. Answer the questions on each text by choosing A, B, C or D. Mark your answers on your ANSWER SHEET.
Text 1
Passwords are everywhere in computer curity. All too often, they are also ineffective. A good password has to be both easy to remember and hard to guess ,but in practice people em to pay attention to the former. Names of wives, husbands and children are popular. “123456” or “12345” are also common choices.切西瓜的方法
That predictability lets curity rearchers (and hackers) create dictionaries which list common passwords, uful to tho eking to break in. But although rearchers know that passwords are ins
ecure ,working out just how incure has been difficult. Many studies have only small samples to work on.
However, with the co-operation of Yahoo!,Joph Bonneau of Cambridge University obtained the biggest sample to date University obtained the biggest sample to date—— 70 million passwords that came with uful data about their owners.
小班化教学Mr Bonneau found some interesting variations. Older urs had better passwords than young ones. People who preferred language was Korean or German cho the most cure passwords ;tho who spoke Indonesian the least. Passwords designed to hide nsitive information such as credit-card numbers were only slightly more cure than tho than tho protecting less important things, like access to games. “Nag screens” that protecting less important things, like access to games. “Nag screens” that told urs they had chon a weak password made virtually no difference. And urs who accounts had been hacked in the past did not make more cure choices than tho who had never been hacked.
But it is the broader analysis of the sample that is of most interest to curity rearchers. For, despite their differences ,the 70 million urs were still predictable enough that a generic password
dictionary was effective against both the entire sample and any slice of it. Mr Bonneau is blunt :“An attacker who can manage ten guess per account will compromi around 1% of accounts. ” And that is a worthwhile outcome for a hacker.
One obvious solution would be for sites to limit the number of guess that can be made before access is blocked. Yet whereas the biggest sites, such as Google and Microsoft, do take such measures, many do not. The reasons of their not doing so are various various. So it’s time for urs to consider the alternatives to traditional passwords. . So it’s time for urs to consider the alternatives to traditional passwords.
26. People tend to u passwords that are _____.
[A] easy to remember [B] hard to figure out
[C] random numbers [D ] popular names
原来是这样作文
一国两制前提【答案】A小数乘法
27. Rearchers find it difficult to know how unsafe passwords are due to _____.怎样快速充电
>掉睫毛