信管网每日一练

导航

信息安全工程师每日一练试题(2021/10/14)

2021年10月15日来源:信管网 作者:cnitpm

信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6

往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html

信息安全工程师每日一练试题(2021/10/14)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2021/10/14

点击查看:更多信息安全工程师习题与指导

信息安全工程师每日一练试题内容(2021/10/14)

试题1: The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. A block cipher is, in a sense, a modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of (71 )and a key, and output a block of ciphertext of the same size. Since messages are almost always longer than a single block, some method of knitting together successive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and must be carefully considered when using a block cipher in a cryptosystem.
The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are( 72 )designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted). Despite its deprecation as an official standard, DES (especially its still-approved and much more secure triple-DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality. Many have been thoroughly broken. See Category: Block ciphers.
Stream ciphers, in contrast to the ‘block’type, create an arbitrarily long stream of key material, which is combined ( 73 )the plaintext bit-by-bit or character-by-character, somewhat like the one-time pad. In a stream cipher, the output( 74 )is created based on an internal state which changes as the cipher operates. That state change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a well-known, and widely used, stream cipher; see Category: Stream ciphers.
Cryptographic hash functions (often called message digest functions) do not necessarily use keys, but are a related and important class of cryptographic algorithms. They take input data (often an entire message), and output a short fixed length hash, and do so as a one-way function. For good ones, ( 75 ) (two plaintexts which produce the same hash) are extremely difficult to find.
Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key is used to authenticate the hash value on receipt. These block an attack against plain hash functions.
(71)
A.plaintext
B.ciphertext
C.data
D.hash
(72)
A.stream cipher
B.hash function
C.Message authentication code
D.Block cipher
(73)
A.of
B.for
C.with
D.in
(74)
A.hash
B.stream
C.ciphertext
D.plaintext
(75)
A.collisions
B.image
C.preimage
D.solution
试题解析与讨论:www.cnitpm.com/st/4115223167.html
试题参考答案:A、D、C、B、A

试题2

一个全局的安全框架必须包含的安全结构因素是()
A、审计、完整性、保密性、可用性
B、审计、完整性、身份认证、保密性、可用性
C、审计、完整性、身份认证、可用性
D、审计、完整性、身份认证、保密性

试题解析与讨论:www.cnitpm.com/st/28490785.html
试题参考答案:B

试题3: 身份认证是证实客户的真实身份与其所声称的身份是否相符的验证过程。目前,计算机及网络系统中常用的身份认证技术主要有:用户名/密码方式、智能卡认证、动态口令、生物特征认证等。其中能用于身份认证的生物特征必须具有(  )。
A.唯一性和稳定性
B.唯一性和保密性
C.保密性和完整性
D.稳定性和完整性
试题解析与讨论:www.cnitpm.com/st/411269152.html
试题参考答案:A

试题4: 下列关于公钥密码体制说法不正确的是(  )。
A.在一个公钥密码体制中,一般存在公钥和私钥两个密钥
B.公钥密码体制中仅根据密码算法和加密密钥来确定解密密钥在计算上是可行的
C.公钥密码体制中仅根据密码算法和加密密来确定解密密在计算上是不可行的
D.公钥密码体制中的私钥可以用来进行数字签名
试题解析与讨论:www.cnitpm.com/st/389898585.html
试题参考答案:B

试题5: 数字水印技术通过在数字化的多媒体数据中嵌入隐蔽的水印标记,可以有效实现对数字多媒体数据的版权保护功能。以下关于数字水印的描述中,不正确的是(  )。
A.隐形数字水印可应用于数据侦测与跟踪
B.在数字水印技术中,隐藏水印的数据量和鲁棒性是一对矛盾
C.秘密水印也称盲化水印,其验证过程不需要原始秘密信息
D.视频水印算法必须满足实时性的要求
试题解析与讨论:www.cnitpm.com/st/411011580.html
试题参考答案:C

试题6: SSL协议(安全套接层协议)是Netscape公司推出的一种安全通信协议,以下服务中,SSL协议不能提供的是(  )。
A.用户和服务器的合法性认证服务
B.加密数据服务以隐藏被传输的数据
C.维护数据的完整性
D.基于UDP应用的安全保护
试题解析与讨论:www.cnitpm.com/st/411353400.html
试题参考答案:D

试题7: 恶意软件是目前移动智能终端上被不法分子利用最多、对用户造成危害和损失最大的安全成胁类型。数据显示,目前安卓平台恶意软件主要有(  )四种类型。
A.远程控制木马、话费吸取类、隐私窃取类和系统破坏类
B.远程控制木马、话费吸取类、系统破坏类和硬件资源消耗类
C.远程控制木马、话费吸取类、隐私窃取类和恶意推广
D.远程控制木马、话费吸取类、系统破坏类和恶意推广
试题解析与讨论:www.cnitpm.com/st/3893322538.html
试题参考答案:A

试题8

S/Key口令是一种一次性口令生产方案,它可以对抗()
A、恶意代码木马攻击
B、拒绝服务攻击
C、协议分析攻击
D、重放攻击

试题解析与讨论:www.cnitpm.com/st/2845025503.html
试题参考答案:D

试题9: 在PKI中,关于RA的功能,描述正确的是(  )。
A.RA是整个PKI体系中各方都承认的一个值得信赖的、公正的第三方机构
B.RA负责产生,分配并管理PKI结构下的所有用户的数字证书,把用户的公钥和用户的其他信息绑在一起,在网上验证用户的身份
C.RA负责证书废止列表CRL的登记和发布
D.RA负责证书申请者的信息录入,审核以及证书的发放等任务,同时,对发放的证书完成相应的管理功能
试题解析与讨论:www.cnitpm.com/st/389837447.html
试题参考答案:D

试题10: 在我国,依据《中华人民共和国标准化法》可以将标准划分为:国家标准、行业 标准、地方标准和企业标准4个层次。《信息安全技术信息系统安全等级保护基本要求》 (GB/T 22239-2008)属于(  )。
A.国家标准
B.行业标准
C.地方标准
D.企业标准
试题解析与讨论:www.cnitpm.com/st/411391775.html
试题参考答案:A

温馨提示:因考试政策、内容不断变化与调整,信管网提供的以上信息仅供参考,如有异议,请考生以权威部门公布的内容为准!

分享至:
请使用浏览器的分享功能,把好文章分享给更多的人

信管网 - 信息系统项目管理专业网站

下载APP-在线学习

培训课程

0元畅享

考试题库

免费资料

APP下载