信管网每日一练
信息安全工程师 - 每日一练 导航

信息安全工程师每日一练试题(2024/2/10)

2024年02月12日来源:信管网 作者:cnitpm

信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6

往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html

信息安全工程师每日一练试题(2024/2/10)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2024/2/10

点击查看:更多信息安全工程师习题与指导

信息安全工程师每日一练试题内容(2024/2/10)

  • 试题1

    为防范国家数据安全风险,维护国家安全,保护公共利益,2021年7月,中国网络安全审查办公室发布公告,对“滴滴出行”“运满满”“货车帮”和“BOSS直聘”开展网络安全审查。此次审查依据的国家相关法律法规是(   )。
    A.《中华人民共和国网络安全法》和《中华人民共和国国家安全法》
    B.《中华人民共和国网络安全法》和《中华人民共和国密码法》
    C.《中华人民共和国数据安全法》和《中华人民共和国网络安全法》
    D.《中华人民共和国数据安全法》和《中华人民共和国国家安全法》

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/st/5222512951.html

  • 试题2

    《计算机信息系统安全保护等级划分准则》(GB17859-1999)中规定了计算机系统安全保护能力的五个等级,其中要求对所有主体和客体进行自主和强制访问控制的是(  )。
    A.用户自主保护级
    B.系统审计保护级
    C.安全标记保护级
    D.结构化保护级

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/st/3892624867.html

  • 试题3

    用户在实际应用中通常将入侵检测系统放置在防火墙内部,这样可以( )。
    A.增强防火墙的安全性
    B.扩大检测范围
    C.提升检测效率
    D.降低入侵检测系统的误报率

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/st/57379669.html

  • 试题4

    Trust is typically interpreted as a subjective belief in the reliability, honesty and  security  of an entity on which we depend ( )our welfare .In online environments we depend on a wide spectrun of things , ranging from computer hardware,software and data to people and organizations. A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions , hence , a trusted entity is the same as an entity that is assumed to function according to  policy . A consequence of this is that a trust component of a system must work correctly in order   for the security of that system to hold, meaning that when a trusted(  )fails , then the sytems and applications that depend on it can(  )be considered secure.An often cited articulation of this principle is:" a trusted system or component is one that can break your security policy” ( which happens when the trust system fails ). The same applies to a trusted party such as a service provider ( SP for short )that is , it must operate according to the agreed or assumed   policy in order to ensure the expected level of securty and quality of services . A paradoxical   conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on . This is because the security of an infrastructure consisting of many.
    Trusted components typically follows the principle of the weakest link , that is ,in many situations the the overall security can only be as strong as the least reliable or least secure of all the trusted components. We cannot avoid using trusted security components,but the fewer the better. This is important to understand when designing the  identity management architectures,that is, fewer the trusted parties in an identity management model , stronger the security that can be achieved by it.
    The transfer of the social constructs of identity and trust into digital and computational concepts helps in designing and implementing large scale online markets and communities,and also plays an important role in the converging mobile and Internet environments.Identity management (denoted Idm hereafter ) is about recognizing and verifying the correctness of identitied in online environment .Trust management becomes a component of (  )whenever different parties rely on each other for identity provision and authentication . IdM and Trust management therefore depend on each other in complex ways because the correctness of the identity itself must be trusted for the quality and reliability of the corresponding entity to be trusted.IdM is also an essential concept when defining  authorisation policies in personalised services.
    Establishing trust always has a cost, so that having  complex trust requirement typically leads to high overhead in establishing the required trust. To reduce costs there will be incentives for stakeholders to “cut corners”regarding trust requirements ,which could lead to inadequate security . The challenge is to design IdM systems with relatively simple trust requirements.Cryptographic mechanisms are often a core component of IdM solutions,for example,for entity and data authentication.With cryptography,it is often possible to propagate trust from where it initially exists to where it is needed .The establishment of initial(  )usually takes place in the physical world,and the subsequent propagation of trust happens online,often in an automated manner.
    (71)A.with
    B. on
    C. of
    D. for
    (72)A.entity
    B.person
    C.component
    D.thing
    (73)A. No longer
    B. never
    C. always
    D.often
    (74)A. SP
    B. IdM
    C.Internet
    D.entity
    (75)A.trust
    B.cost
    C.IdM
    D. solution

    查看答案

    试题参考答案:D、C、A、B、A

    试题解析与讨论:www.cnitpm.com/st/389944612.html

  • 试题5

    操作系统的安全审计是指对系统中有关安全的活动进行记录、检查和审核的过程,为了完成审计功能,审计系统需要包括(  )三大功能模块。
    A.审计数据挖掘,审计事件记录及查询、审计事件分析及响应报警
    B.审计事件特征提取、审计事件特征匹配、安全响应报警
    C.审计事件收集及过滤、审计事件记录及查询,审计事件分析及响应报警系统
    D.日志采集与挖掘、安全事件记录及查询、安全响应报警

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/st/3896821058.html

  • 试题6

    以下关于BLP安全模型的表述中, 错误的是()
    A.BLP模型既有自主访问控制,又有强制访问控制
    B.BLP模型是一个严格形式化的模型,并给出了形式化的证明
    C.BLP模型控制信息只能由高向低流动
    D.BLP是一种多级安全策略模型

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/st/502065741.html

  • 试题7

    通用入侵检测框架模型(CIDF)由事件产生器、事件分析器、响应单元和事件数据库四个部分组成。其中向系统其他部分提供事件的是(    )
    A.事件产生器
    B.事件分析器
    C.响应单元
    D.事件数据库

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/st/5226223863.html

  • 试题8

    SM4算法是国家密码管理局于2012年3月21日发布的一种分组密码算法,在我国商用密码体系中,SM4主要用于数据加密。SM4算法的分组长度和密钥长度分别为().
    A.128位和64位
    B.128位和128位
    C.256位和128位
    D.256位和256位

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/st/5020222146.html

  • 试题9

    对于定义在GF(p)上的椭圆曲线,取素数P=11,椭圆曲线y2=x3+x+6mod11,则以下是椭圆曲线11平方剩余的是(  )。
    A.x=1
    B.x=3
    C.x=6
    D.x=9

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/st/3898520398.html

  • 试题10

    安卓的系统架构从上层到下层包括:应用程序层、应用程序框架层、系统库和安卓运行时、Linux内核。其中,文件访问控制的安全服务位于()
    A.应用程序层
    B.应用程序框架层
    C.系统库和安卓运行时
    D.Linux内核

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/st/327164848.html

温馨提示:因考试政策、内容不断变化与调整,信管网提供的以上信息仅供参考,如有异议,请考生以权威部门公布的内容为准!

分享至:

信管网 - 信息系统项目管理专业网站

下载APP-在线学习

培训课程

0元畅享

考试题库

免费资料

客服咨询