2016年12月四级真题第三套段落匹配题SectionBDirections:Inthissection,youaregoingtoreadapassagewithtenstatementsattachedtoit.Eachstatementcontainsinformationgiveninoneoftheparagraphs.Identifytheparagraphfromwhichtheinformationisderived.Youmaychooseaparagraphmorethanonce.Eachparagraphismarkedwithaletter.AnswerthequestionsbymarkingthecorrespondingletteronAnswerSheet2.CanBurglarsJamYourWirelessSecuritySystem?A.Anyproductthatpromisestoprotectyourhomedeservescarefulexamination.Soitisn’tsurprisingthatyou’11findplentyofstrongopinionsaboutthepotentialvulnerabilitiesofpopularhome—securitysystems.B.Themostlikelytypeofburglary(人室盗窃)byfaristheunsophisticatedcrimeofopportunity,usuallyinvolvingabrokenwindoworsomeforcedentry.AccordingtotheFB1.crimesliketheseaccountedforroughlytwo.thirdsofallhouseholdburglariesintheUSin2013.Thewidemajorityoftherestwereillegal.unforcedentriesthatresultedfromsomethinglikeawindowbeingleftopen.TheoddsofacriminalusingtechnicalmeanstobypassasecuritysystemaresosmallthattheFBIdoesn’teventrackthosestatistics.C.Oneofthemaintheoreticalhome—securityconcernsiswhetherornotagivensystemisvulnerabletobeingblockedfromworkingaltogether.Withwiredsetups,thefearisthataburglar(人室盗贼)mightbeabletoshutyoursystemdownsimplybycuttingtherightcable.Withawirelesssetup.youstickbattery—poweredsensorsuparoundyourhomethatkeepaneyeonwindows。doors,motion,andmore.Iftheydetectsomethingwrongwhilethesystemisarmed.they’lltransmitawirelessaleftsignaltoabasestationthatwillthenraisethealarm.Thatapproachwilleliminatemostcord—cuttingconcerns--butwhatabouttheirwirelessequivalent,jamming?withthefightdevicetunedtothefightfrequency,what’stostopathieffromjammingyoursetupandblockingthatalertsignalfromeverreachingthebasestation?D.Jammingconcernsarenothingnew,andthey’renotuniquetosecuritysystems.Anydevicethat’sbuilttoreceiveawirelesssignalataspecificfrequencycanbeoverwhelmedbyastrongersignalcominginonthesamefrequency.Forcomparison.1et’ssayyouwantedto“jam”aconversationbetweentwopeople—allyou’dneedtodoisyellinthelistener’sear.E)Securitydevicesarerequiredtolistthefrequenciestheybroadcaston—matmeansthatapotentialthiefcanfindwhattheyneedtoknowwithminimalGoogling.Theywill.however.needtoknowwhatsystemthey’relookingfor.Ifyouhaveasigninyouryarddeclaringwhatsetupyouuse,that’dpointthemintherightdirection,thoughatthatpoint,we’retalkingaboutahighlytargeted,semi—sophisticatedattack,andnotthesortofforced—entryattackthatmakesupthemajorityofburglaries.It’seasiertofindandacquirejammingequipmentforsomefrequenciesthanitisforothers.F)Wirelesssecurityproviderswilloftentakestepstohelpcombatthethreatofjammingattacks.SimpliSafe,winnerofourEditors’Choicedistinction.utilizesaspecialsystemthat’scapableofseparatingincidentalRFinterferencefromtargetedjammingattacks.Whenthesystemthinksit’sbeingjammed,it’llnotifyyouviapushalert(推送警报).Fromthere,it’suptoyoutosoundthealarmmanually.G)SimpliSafewassingledoutinonerecentarticleonjamming,completewithavideoshowingtheentiresystembeingeffectivelybypassedwithhandheldjammingequipment.AftertakingappropriatemeasurestocontaintheRFinterferencetoourtestlab,wetestedtheattackoutforourselves,andwereabletoverifythatit’spossiblewiththerightequipment.However.wealsoverifiedthatSimpliSafe’santi-jammingsystemworks.Itcaughtusintheact,sentanalerttomysmartphone,andalsolistedourRFinterferenceonthesystem’seventlog.Theteambehindthearticleandvideoinquestionmakenomentionofthesystem,orwhetherornotitdetectedthem.H)Weliketheuniquenatureofthatsoftware.Itmeansthatathieflikelywouldn’tbeabletoGooglehowthesystemworks.thenfigureoutawayaroundit.Eveniftheycould,SimpliSafeclaimsthatitssystemisalwaysevolving,andthatitvariesslightlyfromsystemtosystem,whichmeanstherewouldn’tbeauniversalmagicformulaforcrackingit.Othersystemsalsoseemconfidentonthesubjectofjamming.TheteamatFrontpointaddressestheissueinablogonitssite,citingtheirownjamprotectionsoftwareandclaimingthattherearen’tanydocumentedcasesofasuccessfuljamattacksincethecompanybeganofferingwirelesssecuritysensorsinthel980s.I)Jammingattacksareabsolutelypossible.Assaidbefore.withthefightequipmentandtherightknow—how,it’spossibletojamanywirelesstransmission.Buthowprobableisitthatsomeonewillsuccessfullyjamtheirwayintoyourhomeandstealyourstuff?J)Let’simaginethatyouliveinasmallhomewithawirelesssecuritysetupthatoffersafunctionalanti—jammingsystem.First,athiefisgoingtoneedtotargetyourhome,specifically.Then,he’sgoingtoneedtoknowthetechnicaldetailsofyoursystemandacquirethespecificequipmentnecessaryforjammingyourspecificsetup.Presumably,youkeepyourdoorslockedatnightandwhileyou’reaway,sothethiefwillstillneedtobreakin.Thatmeansdefeatingthelocksomehow,orbreakingawindow.He’11needtobejammingyouatthispoint,asabrokenwindoworopeneddoorwouldnormallyreleasethealarm.S0,too,wouldthemotiondetectorsinyourhome,sothethiefwillneedtocontinuejammingoncehe’sinsideandsearchingforthingstosteal.However.he’11needtodosowithouttrippingtheanti-jammingsystem,thedetailsofwhichhealmostcertainlydoesnothaveaccessto.K)Attheendoftheday,thesekindsofsystemsareprimarilydesignedtoprotectagainstthesortofopportunisticsmash—and—grabattackthatmakesupthemajorityofburglaries.They’realsoonlyasinglelayerinwhatshouldideallybeamany—sidedapproachtosecuringyourhome,onethatincludescommonsensethingslikesoundlocksandproperexteriorlightingatnight.Nosystemisimpenetrable,andnonecanpromisetoeliminatetheworstcasecompletely.Everyoneofthemhasvulnerabilitiesthataknowledgeablethiefcouldtheoreticallyexploit.Agoodsystemisonethatkeepsthatworst—casesettingasimprobableaspossiblewhilealsoofferingstrongprotectionintheeventofaless-extraordinaryattack.--1.Itispossibleforburglarstomakejammingattackswiththenecessaryequipmentandskill.--2.Interferingwithawirelesssecuritysystemissimilartointerferingwithaconversation.--3.Aburglarhastocontinuouslyjamthewirelesssecuritydevicetoavoidtriggeringthealarm,bothinsideandoutsidethehouse.--4.SimpliSafeprovidesdevicesthatareabletodistinguishincidentalradiointerferencefromtargetedjammingattacks.--5.Onlyaverysmallproportionofburglariesarecommittedbytechnicalmeans.--6.ItisdifficulttocrackSimpliSafeasitssystemkeepschanging.--7.Wirelessdeviceswilltransmitsignalssoastoactivatethealarmoncesomethingwrongisdetected.--8.Differentmeasuresshouldbetakentoprotectone’shomefromburglaryinadditiontothewirelesssecuritysystem.--9.SimpliSafe’sdevicecansendawarningtothehouseowner’scellphone.--10.Burglarscaneasilygetasecuritydevice’sfrequencybyInternetsearch.
举一反三
- 设DES加密算法中的一个S盒为: 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 1 2 3 14 4 13 1 2 15 11 8 3 10 6 12 5 9 0 7 0 15 7 4 14 2 13 1 10 6 12 11 9 5 3 8 4 1 14 8 13 6 2 11 15 12 9 7 3 10 5 0 15 12 8 2 4 9 1 7 5 11 A: 1010 B: 0001 C: 1011 D: 0111
- 设DES加密算法中的一个S盒为: 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 1 2 3 14 4 13 1 2 15 11 8 3 10 6 12 5 9 0 7 0 15 7 4 14 2 13 1 10 6 12 11 9 5 3 8 4 1 14 8 13 6 2 11 15 12 9 7 3 10 5 0 15 12 8 2 4 9 1 7 5 11 3 14 10 0 6 13 若给定输入为101101,则该S盒的输出的二进制表示为
- 下面是图的拓扑排序的是?(多选)[img=340x240]1802faef6ebcc2a.png[/img] A: 2 8 0 7 1 3 5 6 4 9 10 11 12 B: 2 8 7 0 6 9 11 12 10 1 3 5 4 C: 8 2 7 3 0 6 1 5 4 9 10 11 12 D: 8 2 7 0 6 9 10 11 12 1 3 5 4
- 【单选题】myarray1=np.arange(15) myarray2=myarray1.reshape(5,3) print( myarray1) print(myarray2) 输出值是? A. [ 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15] [[ 0 1 2] [ 3 4 5] [ 6 7 8] [ 9 10 11] [12 13 14]] B. [ 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15] [[ 1 2 3] [ 4 5 6] [ 7 8 9] [10 11 12] [13 14 15]] C. [ 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14] [[ 0 1 2] [ 3 4 5] [ 6 7 8] [ 9 10 11] [12 13 14]] D. [ 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14] [[ 1 2 3] [ 4 5 6] [ 7 8 9] [10 11 12] [13 14 15]]
- 已知S盒如下表,若输入为100010,则二进制输出为( ) [br][/br] 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 7 13 14 3 0 6 9 10 1 2 8 5 11 12 4 15 1 13 8 11 5 6 15 0 3 4 7 2 12 1 10 14 9 2 10 6 9 0 12 11 7 13 15 1 3 14 5 2 8 4 3 3 15 0 6 10 1 13 8 9 4 5 11 12 7 2 14 A: 0110 B: 1001 C: 0100 D: 0101