Network Threat Identification Technology | Generated by AI
Question: In order to accurately identify and recognize various unsafe factors in the network and then carry out corresponding prevention, elimination, and repair, which computer network security technology is used?
A. Encryption technology
B. Monitoring and auditing technology
C. Authentication technology (鉴别技术)
D. Access control technology
The correct answer given is C.
Answer:
The correct answer is C. 鉴别技术 (authentication/identification technology).
Explanation:
The question describes a technology whose main purpose is to timely and accurately detect, judge, and identify various unsafe factors in the network — such as attacks, theft, tampering, viruses, worms, trojans, and other malicious code — so that corresponding prevention, elimination, and repair measures can be taken.
Let’s analyze each option:
- A. Encryption technology: Mainly protects the confidentiality of data by making it unreadable to unauthorized parties. It does not focus on detecting or identifying attacks/malware.
- B. Monitoring and auditing technology: Focuses on recording and tracking user/network activities and system events, usually for later analysis or compliance. It is more passive (logging) than active real-time identification and judgment of threats.
- C. 鉴别技术 (Authentication / Identification / Detection technology): In the context of this question (and according to the provided explanation), this refers to technologies that actively identify and recognize security threats, abnormal behaviors, malicious code, intrusions, etc. This matches the description in the question very closely — timely and accurate judgment and identification of unsafe factors → prevention, elimination, repair.
- D. Access control technology: Primarily decides who is allowed to access what resources (authorization). It prevents unauthorized access but is not mainly responsible for detecting/identifying ongoing attacks or malicious code.
Although in modern English terminology “鉴别技术” is most commonly translated as authentication (verifying identity), in many Chinese computer security textbooks and exam contexts (especially older materials or specific exam question banks), “鉴别技术” is used more broadly to include threat detection, intrusion detection, malicious code identification, etc.
Given the question’s wording and the official explanation provided, C is the intended correct answer in this specific exam context.
References:
- None (based on the question explanation provided)