2024年06月19日来源:信管网 作者:cnitpm
信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6
往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html
信息安全工程师每日一练试题(2024/6/18)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2024/6/18
点击查看:更多信息安全工程师习题与指导
信息安全工程师每日一练试题内容(2024/6/18)
试题1
S/Key口令是一种一次性口令生产方案,它可以对抗()
A、恶意代码木马攻击
B、拒绝服务攻击
C、协议分析攻击
D、重放攻击
查看答案
试题参考答案:D
试题2
如果破译加密算法所需要的计算能力和计算时间是现实条件所不具备的,那么就认为相应的密码体制是( )。查看答案
试题参考答案:A
试题3
安全策略表达模型是一种对安全需求与安全策略的抽象概念模型,一般分为自主访问控制模型和强制访问控制模型。以下属于自主访问控制模型的是()查看答案
试题参考答案:B
试题4
PDR模型是一种体现主动防御思想的网络安全模型,该模型中D表示( )。查看答案
试题参考答案:B
试题5
BiBa 模型主要用于防止非授权修改系统信息,以保护系统的信息完整性,该模型提出的“主体不能向上写”指的是( )查看答案
试题参考答案:D
试题6
数字证书是一种由一个可信任的权威机构签署的信息集合。PKI中的X. 509数字证书的内容不包括( )。查看答案
试题参考答案:D
试题7
设在RSA的公钥密码体制中,公钥为(e,n)=(7,55),则私钥d=( )。查看答案
试题参考答案:D
试题8
面向数据挖掘的隐私保护技术主要解决高层应用中的隐私保护问题,致力于研究如何根据不同数据挖掘操作的特征来实现对隐私的保护。从数据挖掘的角度看,不属于隐私保护技术的是()。查看答案
试题参考答案:C
试题9
There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment (1)(e.g. TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other (2), the attacker inserts a large amount of (3)packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an (4)who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.
Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE)eNodeB is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(5)the net work.
查看答案
试题参考答案:C、B、C、D、A
试题10
网络攻击者经常采用的工具主要包括:扫描器、远程监控、密码破解、网络嗅探器、安全渗透工具箱等。以下属于网络嗅探器工具的是( )。查看答案
试题参考答案:D
温馨提示:因考试政策、内容不断变化与调整,信管网提供的以上信息仅供参考,如有异议,请考生以权威部门公布的内容为准!
相关推荐