Network Threat Identification Technology | Generated by AI

Home 2026.03

Question: In order to accurately identify and recognize various unsafe factors in the network and then carry out corresponding prevention, elimination, and repair, which computer network security technology is used?

A. Encryption technology
B. Monitoring and auditing technology
C. Authentication technology (鉴别技术)
D. Access control technology

The correct answer given is C.

Answer:

The correct answer is C. 鉴别技术 (authentication/identification technology).

Explanation:

The question describes a technology whose main purpose is to timely and accurately detect, judge, and identify various unsafe factors in the network — such as attacks, theft, tampering, viruses, worms, trojans, and other malicious code — so that corresponding prevention, elimination, and repair measures can be taken.

Let’s analyze each option:

Although in modern English terminology “鉴别技术” is most commonly translated as authentication (verifying identity), in many Chinese computer security textbooks and exam contexts (especially older materials or specific exam question banks), “鉴别技术” is used more broadly to include threat detection, intrusion detection, malicious code identification, etc.

Given the question’s wording and the official explanation provided, C is the intended correct answer in this specific exam context.

References:


Back Donate