信管网每日一练

导航

信息安全工程师每日一练试题(2021/12/21)

2021年12月22日来源:信管网 作者:cnitpm

信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6

往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html

信息安全工程师每日一练试题(2021/12/21)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2021/12/21

点击查看:更多信息安全工程师习题与指导

信息安全工程师每日一练试题内容(2021/12/21)

试题1: 密码分析者针对加解密算法的数学基础和某些密码学特性,根据数学方法破译密码的攻击方式称为(  )。
A.数学分析攻击
B.差分分析攻击
C.基于物理的攻击
D.穷举攻击
试题解析与讨论:www.cnitpm.com/st/3892725663.html
试题参考答案:A

试题2: 如果对一个密码体制的破译依赖于对某一个经过深入研究的数学难题的解决,就认为相应的密码体制是(  )的。
A.计算安全
B.可证明安全
C.无条件安全
D.绝对安全
试题解析与讨论:www.cnitpm.com/st/411494857.html
试题参考答案:B

试题3: 包过滤技术防火墙在过滤数据包时,一般不关心(  )。
A.数据包的源地址
B.数据包的目的地址
C.数据包的协议类型
D.数据包的内容
试题解析与讨论:www.cnitpm.com/st/4112327023.html
试题参考答案:D

试题4: (  )攻击是指借助于客户机/服务器技术,将多个计算机联合起来作为攻击平台,对一个或多个目标发动DoS攻击,从而成倍地提高拒绝服务攻击的威力。
A.缓冲区溢出
B.分布式拒绝服务
C.拒绝服务
D. 口令
试题解析与讨论:www.cnitpm.com/st/4114823197.html
试题参考答案:B

试题5: 电子邮件已经成为传播恶意代码的重途径之一,为了有效防止电子邮件中的恶意代码,应该用(  )的方式阅读电子邮件。
A.应用软件
B.纯文本
C.网页
D.在线
试题解析与讨论:www.cnitpm.com/st/3894812738.html
试题参考答案:B

试题6: 入侵检测技术包括异常入侵检测和误用入侵检测。以下关于误用检测技术的描述中,正确的是(  )。
A.误用检测根据对用户正常行为的了解和掌握来识别入侵行为
B.误用检测根据掌握的关于入侵或攻击的知识来识别入侵行为
C.误用检测不需要建立入侵或攻击的行为特征库
D.误用检测需要建立用户的正常行为特征轮廓
试题解析与讨论:www.cnitpm.com/st/4112521300.html
试题参考答案:B

试题7: 设在RSA的公钥密码体制中,用于为(e,n)=(7,55),则私钥d=()。
A. 8
B. 13
C. 23
D. 37
试题解析与讨论:www.cnitpm.com/st/327521419.html
试题参考答案:C

试题8: 深度流检测技术是一种主要通过判断网络流是否异常来进行安全防护的网络安全技术,深度流检测系统通常不包括(  )。
A.流特征提取单元
B.流特征选择单元
C.分类器
D.响应单元
试题解析与讨论:www.cnitpm.com/st/389673923.html
试题参考答案:D

试题9

有一种攻击是不断对网络服务系统进行干扰,改变其正常的作业流程,执行无关程序使系统响应减慢甚至瘫痪。这种攻击叫做()
A、重放攻击
B、拒绝服务攻击
C、反射攻击
D、服务攻击

试题解析与讨论:www.cnitpm.com/st/2846424079.html
试题参考答案:B

试题10: The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. A block cipher is, in a sense, a modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of (71 )and a key, and output a block of ciphertext of the same size. Since messages are almost always longer than a single block, some method of knitting together successive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and must be carefully considered when using a block cipher in a cryptosystem.
The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are( 72 )designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted). Despite its deprecation as an official standard, DES (especially its still-approved and much more secure triple-DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality. Many have been thoroughly broken. See Category: Block ciphers.
Stream ciphers, in contrast to the ‘block’type, create an arbitrarily long stream of key material, which is combined ( 73 )the plaintext bit-by-bit or character-by-character, somewhat like the one-time pad. In a stream cipher, the output( 74 )is created based on an internal state which changes as the cipher operates. That state change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a well-known, and widely used, stream cipher; see Category: Stream ciphers.
Cryptographic hash functions (often called message digest functions) do not necessarily use keys, but are a related and important class of cryptographic algorithms. They take input data (often an entire message), and output a short fixed length hash, and do so as a one-way function. For good ones, ( 75 ) (two plaintexts which produce the same hash) are extremely difficult to find.
Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key is used to authenticate the hash value on receipt. These block an attack against plain hash functions.
(71)
A.plaintext
B.ciphertext
C.data
D.hash
(72)
A.stream cipher
B.hash function
C.Message authentication code
D.Block cipher
(73)
A.of
B.for
C.with
D.in
(74)
A.hash
B.stream
C.ciphertext
D.plaintext
(75)
A.collisions
B.image
C.preimage
D.solution
试题解析与讨论:www.cnitpm.com/st/4115223167.html
试题参考答案:A、D、C、B、A

温馨提示:因考试政策、内容不断变化与调整,信管网提供的以上信息仅供参考,如有异议,请考生以权威部门公布的内容为准!

分享至:
请使用浏览器的分享功能,把好文章分享给更多的人

信管网 - 信息系统项目管理专业网站

下载APP-在线学习

培训课程

0元畅享

考试题库

免费资料

APP下载