信管网每日一练
信息安全工程师 - 每日一练 导航

信息安全工程师每日一练试题(2022/11/5)

2022年11月06日来源:信管网 作者:cnitpm

信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6

往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html

信息安全工程师每日一练试题(2022/11/5)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2022/11/5

点击查看:更多信息安全工程师习题与指导

信息安全工程师每日一练试题内容(2022/11/5)

  • 试题1

    以下关于TCP协议的描述,错误的是(  )。
    A.TCP是Internet传输层的协议,可以为应用层的不同协议提供服务
    B.TCP是面向连接的协议,提供可靠、全双工的、面向字节流的端到端的服务
    C.TCP使用二次握手来建立连接,具有很好的可靠性
    D.TCP每发送一个报文段,就对这个报文段设置一次计时器

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/st/389505321.html

  • 试题2

    SM4算法是国家密码管理局于2012年3月21日发布的一种分组密码算法,在我国商用密码体系中,SM4主要用于数据加密。SM4算法的分组长度和密钥长度分别为().
    A.128位和64位
    B.128位和128位
    C.256位和128位
    D.256位和256位

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/st/5020222146.html

  • 试题3

    注入语句:http://xxx.xxx.xxx/abc.asp?p=YY and user>0不仅可以判断服务器的后台数据库是否为SQL-SERVER,还可以得到()
    A、当前连接数据库的用户数据
    B、当前连接数据库的用户名
    C、当前连接数据库的用户口令
    D、当前连接的数据库名

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/st/2846214573.html

  • 试题4

    一个密码系统至少由明文、密文、加密算法、解密算法和密钥五个部分组成,而其安全性是由()决定的。
    A、加密算法
    B.解密算法
    C.加解密算法
    D.密钥

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/st/502354109.html

  • 试题5

    IP地址欺骗的发生过程,下列顺序正确的是()。①确定要攻击的主机A;②发现和他有信任关系的主机B;③猜测序列号;④成功连接,留下后面;⑤将B利用某种方法攻击瘫痪。
    A.①②⑤③④
    B.①②③④⑤
    C.①②④③⑤
    D.②①⑤③④

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/st/3273328170.html

  • 试题6

    The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. A block cipher is, in a sense, a modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of (71 )and a key, and output a block of ciphertext of the same size. Since messages are almost always longer than a single block, some method of knitting together successive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and must be carefully considered when using a block cipher in a cryptosystem.
    The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are( 72 )designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted). Despite its deprecation as an official standard, DES (especially its still-approved and much more secure triple-DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality. Many have been thoroughly broken. See Category: Block ciphers.
    Stream ciphers, in contrast to the ‘block’type, create an arbitrarily long stream of key material, which is combined ( 73 )the plaintext bit-by-bit or character-by-character, somewhat like the one-time pad. In a stream cipher, the output( 74 )is created based on an internal state which changes as the cipher operates. That state change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a well-known, and widely used, stream cipher; see Category: Stream ciphers.
    Cryptographic hash functions (often called message digest functions) do not necessarily use keys, but are a related and important class of cryptographic algorithms. They take input data (often an entire message), and output a short fixed length hash, and do so as a one-way function. For good ones, ( 75 ) (two plaintexts which produce the same hash) are extremely difficult to find.
    Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key is used to authenticate the hash value on receipt. These block an attack against plain hash functions.
    (71)
    A.plaintext
    B.ciphertext
    C.data
    D.hash
    (72)
    A.stream cipher
    B.hash function
    C.Message authentication code
    D.Block cipher
    (73)
    A.of
    B.for
    C.with
    D.in
    (74)
    A.hash
    B.stream
    C.ciphertext
    D.plaintext
    (75)
    A.collisions
    B.image
    C.preimage
    D.solution

    查看答案

    试题参考答案:A、D、C、B、A

    试题解析与讨论:www.cnitpm.com/st/4115223167.html

  • 试题7

    两个密钥三重DES加密:C=CK1[DK2[EK1[P]]],K1≠K2,其中有效的密钥为()
    A、56
    B、128
    C、168
    D、112

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/st/285084964.html

  • 试题8

    从安全属性对各种网络攻击进行分类,阻断攻击是针对()的攻击
    A.机密性
    B.可用性
    C.完整性
    D.真实性

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/st/3271121583.html

  • 试题9

    以下关于数字证书的叙述中,错误的是()
    A、证书通常由CA安全认证中心发放
    B、证书携带持有者的公开密钥
    C、证书的有效性可以通过验证持有者的签名
    D、证书通常携带CA的公开密钥

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/st/284742576.html

  • 试题10

    操作系统的安全机制是指在操作系统中利用某种技术、某些软件来实施一个或多个安全服务的过程。操作系统的安全机制不包括()。
    A.标识与鉴别机制
    B.访问控制机制
    C.密钥管理机制
    D.安全审计机制

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/st/5019321927.html

温馨提示:因考试政策、内容不断变化与调整,信管网提供的以上信息仅供参考,如有异议,请考生以权威部门公布的内容为准!

分享至:

信管网 - 信息系统项目管理专业网站

下载APP-在线学习

培训课程

0元畅享

考试题库

免费资料

客服咨询