2022年08月23日来源:信管网 作者:cnitpm
信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6
往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html
信息安全工程师每日一练试题(2022/8/22)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2022/8/22
点击查看:更多信息安全工程师习题与指导
信息安全工程师每日一练试题内容(2022/8/22)
试题1
特洛伊木马攻击的威胁类型属于()
A、授权侵犯威胁
B、渗入威胁
C、植入威胁
D、旁路控制威胁
查看答案
试题参考答案:C
试题解析与讨论:www.cnitpm.com/st/284819103.html
试题2
属于对称加密算法。查看答案
试题参考答案:B
试题3
雪崩效应指明文或密钥的少量变化会引起密文的很大变化。下列密码算法中不具有雪崩效应的是()查看答案
试题参考答案:D
试题4
下列关于公钥体制中说法不正确的是()查看答案
试题参考答案:B
试题5
信息通过网络进行传输的过程中,存在着被慕改的风险,为了解决这一安全隐患通常采用的安全防护技术是( )。查看答案
试题参考答案:C
试题6
计算机取证主要是对电子证据的获取、分析、归档和描述的过程,而电子证据需要在法庭上作为证据展示,进行计算机取证时应当充分考虑电子证据的真实性和电子证据的证明力,除了相关准备之外,计算机取证步骤通常不包括()查看答案
试题参考答案:D
试题解析与讨论:www.cnitpm.com/st/326941650.html
试题7
包过滤技术防火墙在过滤数据包时,一般不关心( )。查看答案
试题参考答案:D
试题8
(1)is the science of hiding information. Whereas the goal of cryptography is to make data unreadable by a third party. the goal of steganography is to hide the data from a third party. In this article, I will discuss what steganography is, what purposes it serves, and will provide an example using available software.
There are a large number of steganographic (2)that most of us are familiar with (especially if you watch a lot of spy movies), ranging from invisible ink and microdots to secreting a hidden message in the second letter of each word of a large body of text and spread spectrum radio communication. With computers and networks, there are many other ways of hiding informations, such as:
Covert channels (c,g, Loki and some distributed denial-of-service tools use the Internet Control (3)Protocol, or ICMP, as the communication channel between the “bad guy”and a compromicyed system)
Hidden text within Web pages
Hiding files in “plain sight”(c,g. what better place to “hide”a file than with an important sounding name in the c:\winnt system32 directory)
Null ciphers(c,g, using the first letter of each word to form a hidden message in an otherwise innocuous text)
steganography today, however, is significantly more (4)than the example about suggest, allowing a user to hide large amounts of information within image and audio. These forms of steganography often are used in conjunction with cryptography so the information is double protected; first it is encrypted and then hidden so that an advertisement first. find the information ( an often difficult task in and of itself) and the decrypted it.
The simplest approach to hiding data within an image file is called (5)signature insertion. In this method, we can take the binary representation of the hidden data and the bit of each byte within the covert image. If we are using 24-bit color the amount and will be minimum and indiscriminate to the human eye.
(1)A、Cryptography
B、Geography
C、Stenography
D、Steganography
(2)A、methods
B、software
C、tools
D、services
(3)A、Member
B、Management
C、Message
D、Mail
(4)A、powerful
B、sophistication
C、advanced
D、easy
(5)A、least
B、most
C、much
D、less
查看答案
试题参考答案:D、A、C、B、A
试题9
利用公开密钥算法进行数据加密时,采用的方式是( )。查看答案
试题参考答案:C
试题10
Diffie-Hellman密钥交换协议是一种共享秘钥的方案,该协议是基于求解( )的困难性。查看答案
试题参考答案:B
试题解析与讨论:www.cnitpm.com/st/522412431.html
温馨提示:因考试政策、内容不断变化与调整,信管网提供的以上信息仅供参考,如有异议,请考生以权威部门公布的内容为准!
相关推荐