Студопедия

Главная страница Случайная страница

КАТЕГОРИИ:

АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатикаИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханикаОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторикаСоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансыХимияЧерчениеЭкологияЭкономикаЭлектроника






IV. Choose the correct form of the verb.






1. In this article, we were examined / have examined / have been examined several Internet-centric firewall designs in an attempt to meet security and performance requirements of multitier applications.

2. When designing a network, consider how other components of its perimeter (intrusion detection systems, routers, and VPNs) may / should / must influence the security of infrastructure.

3. In this design, all servers host / are hosted / are hosting on the same subnet, and warrant / are warranted / are warranting equal protection by the firewall that separate / separates / is separated them from the Internet.

4. Many approaches explored / have explored / have been explored, but choices about how to optimize the elliptic curve group operation often depend / are depend / are depended on the relative costs of operations.

5. Worms are programs that can / should / have to run independently and travel from machine to machine across network connections; worms can / should / have to have portions of themselves running on many different machines.

6. A true virus is a sequence of code that inserts / is inserting / is inserted into other executable code, so that when the regular program runs / is running / is run, the viral code executes / is executing / is executed.

7. There is/has been/is been very little progress in the solution of this problem since then.

8. Cryptographers interest/are interesting/are interested in two main classes of problems.

9. The security of the RSA algorithm depends/is depending/is depended on the factoring problem.

10. Cyberterrorists use/are using/are used computers, electronic networks and IT for achievement of the terrorist purpose.

V. Put the verbs in brackets in the correct form. There are some non-finite forms necessary.

1. Speech synthesis (base) on MBROLA algorithm (produce) high quality speech.

2. This method (propose) by the authors (detect) complex attacks.

3. The fingerprint image (need) a resolution of 500 dpi.

4. Quantum Key Exchange (also/know) as Quantum Key Distribution.

5. Such systems (call) hybrid systems.

6. The authentication mechanism (use) (provide) the authentic channel may or may not be secure.

7. Systems (use) Quantum Key Exchange require a quantum channel between the communication parties.

8. Bacteria, also known as rabbits, are programs that (not damage) any files explicitly.

9. The goal of our experiment was (evaluate) empirically the number of distinguishing features for the average user.

10. (Eliminate) reliance on a single firewall you can use multiple firewalls to guard subnet boundaries.


Поделиться с друзьями:

mylektsii.su - Мои Лекции - 2015-2024 год. (0.006 сек.)Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав Пожаловаться на материал