信管网每日一练
信息安全工程师 - 每日一练 导航

信息安全工程师每日一练试题(2023/3/3)

2023年03月04日来源:信管网 作者:cnitpm

信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6

往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html

信息安全工程师每日一练试题(2023/3/3)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2023/3/3

点击查看:更多信息安全工程师习题与指导

信息安全工程师每日一练试题内容(2023/3/3)

  • 试题1

    计算机取证是将计算机调查和分析技术应用于对潜在的、有法律效应的确定和提取。以下关于计算机取证的描述中,错误的是()
    A、计算机取证包括对以磁介质编码信息方式存储的计算机证据的提取和归档
    B、计算机取证围绕电子证据进行,电子证据具有高科技性等特点
    C、计算机取证包括保护目标计算机系统,确定收集和保存电子证据,必须在开计算机的状态下进行
    D、计算机取证是一门在犯罪进行过程中或之后收集证据

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/st/284618752.html

  • 试题2

    文件型病毒不能感染的文件类型是(  )。
    A.SYS型
    B.EXE类型
    C.COM型
    D.HTML型

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/st/389728017.html

  • 试题3

    工业控制系统是由各种自动化控制组件和实时数据采集、监测的过程控制组件共同构成,工业控制系统安全面临的主要威胁不包括()
    A.系统漏洞
    B.网络攻击
    C.设备故障
    D.病毒破坏

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/st/5022913357.html

  • 试题4

    恶意代码是指为达到恶意目的而专门设计的程序或者代码。常见的恶意代码类型有:特洛伊木马、蠕虫、病毒、后门、Rootkit僵尸程序、广告软件。以下恶意代码中,属于宏病毒的是()
    A.Trojan.Bank
    B.Macro.Melissa
    C.Worm.Blaster.g
    D.Trojan.huigezi.a

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/st/502321498.html

  • 试题5

    The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. A block cipher is, in a sense, a modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of (71 )and a key, and output a block of ciphertext of the same size. Since messages are almost always longer than a single block, some method of knitting together successive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and must be carefully considered when using a block cipher in a cryptosystem.
    The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are( 72 )designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted). Despite its deprecation as an official standard, DES (especially its still-approved and much more secure triple-DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality. Many have been thoroughly broken. See Category: Block ciphers.
    Stream ciphers, in contrast to the ‘block’type, create an arbitrarily long stream of key material, which is combined ( 73 )the plaintext bit-by-bit or character-by-character, somewhat like the one-time pad. In a stream cipher, the output( 74 )is created based on an internal state which changes as the cipher operates. That state change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a well-known, and widely used, stream cipher; see Category: Stream ciphers.
    Cryptographic hash functions (often called message digest functions) do not necessarily use keys, but are a related and important class of cryptographic algorithms. They take input data (often an entire message), and output a short fixed length hash, and do so as a one-way function. For good ones, ( 75 ) (two plaintexts which produce the same hash) are extremely difficult to find.
    Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key is used to authenticate the hash value on receipt. These block an attack against plain hash functions.
    (71)
    A.plaintext
    B.ciphertext
    C.data
    D.hash
    (72)
    A.stream cipher
    B.hash function
    C.Message authentication code
    D.Block cipher
    (73)
    A.of
    B.for
    C.with
    D.in
    (74)
    A.hash
    B.stream
    C.ciphertext
    D.plaintext
    (75)
    A.collisions
    B.image
    C.preimage
    D.solution

    查看答案

    试题参考答案:A、D、C、B、A

    试题解析与讨论:www.cnitpm.com/st/4115223167.html

  • 试题6

    国产密码算法是指由国家密码研究相关机构自主研发,具有相关知识产权的商用密码算法。以下国产密码算法中,属于分组密码算法的是 (    )
    A.SM2
    B.SM3
    C.SM4
    D.SM9

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/st/522386616.html

  • 试题7

    安全渗透测试通过模拟攻击者对测评对象进行安全攻击,以验证安全防护机制的有效性。其中需要提供部分测试对象信息,测试团队根据所获取的信息,模拟不同级别的威胁者进行渗透测试,这属于(    )。
    A.黑盒测试
    B.白盒测试
    C.灰盒测试
    D.盲盒测试

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/st/5228114241.html

  • 试题8

    电子邮件是传播恶意代码的重要途径,为了防止电子邮件中的恶意代码的攻击,用()方式阅读电子邮件
    A、网页
    B、纯文本
    C、程序
    D、会话

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/st/284683158.html

  • 试题9

    ()是一种通过对信息进行均衡、安全的防护,提高整个系统最低安全性能的原则。
    A.木桶原则
    B.保密原则
    C.等级化原则
    D.最小特权原则

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/st/3269825030.html

  • 试题10

    以下关于网络流量监控的叙述中,不正确的是()
    A、流量检测中所检测的流量通常采集自主机节点、服务器、路由器接口和路径等
    B、数据采集探针是专门用于获取网络链路流量的硬件设备
    C、流量监控能够有效实现对敏感数据的过滤
    D、网络流量监控分析的基础是协议行为解析技术

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/st/2850711108.html

温馨提示:因考试政策、内容不断变化与调整,信管网提供的以上信息仅供参考,如有异议,请考生以权威部门公布的内容为准!

分享至:

信管网 - 信息系统项目管理专业网站

下载APP-在线学习

培训课程

0元畅享

考试题库

免费资料

客服咨询