Kerberos was developed at (1) in 1998s.It was named after the three-headed watchdog in classical Greek mythology that guards the gates to Hades.The name is apt because Kerberos is a(2)process,depending on a thrid—party service called the(3)to verify one computer’S identity to another and to set up (4) for a secure connection between them.Basically,Kerberos works because each computer shares a secret with the KDC,which has two components:a Kerberos authentication server and a (5)server.If a KDC doesn’t know the requested target server,it refers the authentication transaction to(6)that does.Kerberos is a network(7)protocol that allows one computer to(8)its identity to another across an insecure network through an exchange of encrypted messages.Once identity is verified,kerberos provides the two computer with (9) for a secure communication session.Kerberos authenticates the identity and encrypts their communications through (10). (6)
A. another KDC
B. upper KDC
C. central KDC
D. user
查看答案
ARPAnet is a wide area network(WAN).A network that connected Department of Defense research sites across(1).Created in 1 969 with funding from the Advanced Research Projects Agency(ARPA).Undergoing constant research and development in the early—to mid一1970s,ARPAnet(2)aS the test bed for the development of(3)(the protocols that make the Internet possible).A major goal of the ARPAnet project was to increase the military’s command and control capability by enabling communication across a variety of physically (4)media,including satellites.An allied goal was to create a robust network:(5)withstanding outages,such as those that might result from a nuclear exchange.ARPAnet met these objectives,but it also (6) its creators:It was found in short order that most ARPAnet users (7) use the network for(8),such as electronic mail and discussion groups.Initially,the ARPAnet was available only to government research institutes and to universities holding Department of Defense(DoD)research contracts.In 1 983,ARPAnet was(9)into a high—security military network(Milnet)and an ARPAnet that was recast as a research and development network.Although it formed the (10) of the Internet,it was decommissioned in 1 990. (5)
A. made to
B. able to
C. capable of
D. incapable of
Now a new high-rate extension to the standard,802.11b,lets(1)networks support data rates to 1 1 M bit/see.Ratified in 1997,the-original 802.11 standard united the wireless industry by defining a(2)protocol architecture that worked with conventional upper—layer (3).Also,802.11 maintained compatibility with the three most popular radio transmission types: (4)spread spectrum,~equency-hopping spread spectrum,and infrared(5) ,this new architecture added (6)alt the medium access control(MAC)layer 2 and at the physical(PHY)(7) ,forcing(8)between the two layers in performing the critical tasks involved with initiating and maintaining wireless communications.For instance,to ensure(9)of the wireless link,MAC and PHY work together to determine if a,(10)path exists before they start a transmission. (5)
A. Nevertheless
B. However
C. Eventually
D. Essentially
Most people believe that saving money is quite necessary. But nowadays, many young people like to spend money without thinking of saving it for the future. In this section, you are asked to write an essay on the advantages of saving money. You can provide specific reasons and examples to support your idea. You should write at least 150 words.
下列关于刑罚的具体运用,说法正确的是______。
A. 数罪并罚的情况下管制最高不能超过三年,拘役最高不能超过二年
B. 减刑以后实际执行的刑期,判处管制、拘役、有期徒刑的,不能少于原判刑期的二分之一;判处无期徒刑的,不能少于十五年
C. 有期徒刑的假释考验期限,为没有执行完毕的刑期;无期徒刑的假释考验期限为十年
D. 犯罪后自首的,应当减轻或者免除处罚