大学公共英语三级(PETS 3)真题试卷及答案
大学公共英语三级(PETS 3)真题试卷及答案
  SECTION Ⅱ Reading
安抚奶嘴什么牌子好  (50 minutes)
  Part A
  Directions
  Read the following two texts. Answer the questions on each text by choosing A、B、 C、 D.Mark your answers on your ANSWER SHEET.
  Text 1
  Passwords are everywhere in computer security. All too often, they are also ineffective. A good password has to be both easy to remember and hard to guess, but in practice people seem to pay attention to the former. Names of wives, husbands and children are popular. "123456"or“12345” are also common choices.
  That predictability lets security researchers (and hackers ) create dictionaries which list common passwords, useful to those seeking to break in. But although researchers know that passwords are insecure, working out just how insecure has been difficult. Many studies have only small samples to work on.
  However, with the co-operation of Yahoo !, Joseph Bonneau of Cambridge University obtained the biggest sample to date-70 million passwords that came with useful data about their owners.
  Mr Bonneau found some interesting variations. Older users had better passwords than young ones. People whose preferred language was Korean or German chose the most secure passwords;those who spoke Indonesian the least. Passwords designed to hide sensitive information such as credit-card numbers were only slightly more secure than those protecting less important things, like access to games."Nag screens" that told users they had chosen a weak password made virtually no difference. And users whose accounts had been hacked in the past did not make more secure choices than those who had never been hacked.
  But it is the broader analysis of the sample that is of most interest to security researchers. For despite their differences,the 70 million users were still predictable enough that a generic password dictionary was effective against both the entire sample and any slice of it. Mr Bonneau is blunt:“An attacker who can manage ten guesses per account will compromise around 1% of accounts.”And that is a worthwhile outcome for a hacker.
  One obvious solution would be for sites to limit the number of guesses that can be made before access is blocked. Yet whereas the biggest sites, such as Google and Microsoft, do take such measures,many do not. The reasons of their not doing so are various. So it's time for users to consider the alternatives to traditional passwords.
  26. People tend to use passwords that are _________.
焦距怎么调
  [A] easy to remember
  [B] hard to figure out
  [C] random numbers
  [D] popular names
  27. Researchers find it difficult to know how unsafe passwords are due to_______.
  [A] lack of research tools
  [B] lack of research funds
  [C] limited time of studies
  [D] limited size of samples
  28. It is indicated in the text that________.
  [A] Indonesians are sensitive to password security
  [B] young people tend to have secure passwords
婚伞  [C] nag screens help little in password security
  [D] passwords for credit cards are usually safe
  29. The underlined word"compromise"in Para. 5 most probably means_______.
  [A] comprise
建党100周年标语
  [B] compensate
  [C] endanger
  [D] encounter
吐槽大会3  30. The last paragraph of the text suggests that______.
  [A] net users regulate their online behaviors
  [B] net users rely on themselves for security
  [C] big websites limit the number of guesses
  [D] big websites offer users convenient access
  Text 2
  John Lubbock, a British member of the Parliament, led to the first law to safeguard Britain' s heritage—the Ancient Monuments Bill. How did it happen?
  By the late 1800s more and more people were visiting Stonehenge for a day out. Now a World Heritage Site owned by the Crown, it was, at the time, privately owned and neglected.

版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系QQ:729038198,我们将在24小时内删除。