2024年06月25日来源:信管网 作者:cnitpm
信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6
往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html
信息安全工程师每日一练试题(2024/6/24)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2024/6/24
点击查看:更多信息安全工程师习题与指导
信息安全工程师每日一练试题内容(2024/6/24)
试题1
以下不属于网络安全控制技术的是()
A、防火墙技术
B、访问控制
C、入侵检测技术
D、差错控制
查看答案
试题参考答案:D
试题2
WPKI(无线公开密钥体系)是基于无网络环境的一套遵循既定标准的密钥及证书管理平台,该平台采用的加密算法是( )。查看答案
试题参考答案:D
试题3
为了应对日益严重的垃圾邮件问题,服务提供商设计和应用了各种垃圾邮件过滤机制,以下耗费计算资源最多的垃圾邮件过滤机制是() 。查看答案
试题参考答案:C
试题4
以下关于网络欺骗的描述中,不正确的是( )。查看答案
试题参考答案:B
试题5
设在RSA的公钥密码体制中,用于为(e,n)=(7,55),则私钥d=()。查看答案
试题参考答案:C
试题6
计算机取证是指能够为法庭所接受的、存在于计算机和相关设备中的电子证据的确认、保护、提取和归档的过程。以下关于计算机取证的描述中,不正确的是( )。查看答案
试题参考答案:A
试题7
《计算机信息系统安全保护等级划分准则(GB 17859-1999)》规定,计算机信息系统安全保护能力分为五个等级,其中提供系统恢复机制的是( )。查看答案
试题参考答案:D
试题8
Perhaps the most obvious difference between private-key and public-key encryption is that the former assumes complete secrecy of all cry to graphic keys, whereas the latter requires secrecy for only the private key.Although this may seem like a minor distinction ,the ramifications are huge: in the private-key setting the communicating parties must somehow be able to share the (71) key without allowing any third party to learn it, whereas in the public-key setting the (72) key can be sent from one party to the other over a public channel without compromising security.For parties shouting across a room or, more realistically , communicating over a public network like a phone line or then ternet, public-key encryption is the only option.
Another important distinction is that private-key encryption sch emesuse the (73) key for both encryption and decryption, whereas public key encryption schemes use (74) keys for each operation.That is public-key encryption is inherently as ymmetri C.This asymmetry in the public-key setting means that the roles of sender and receiver are not interchangeable as they are in the private-key setting; a single key-pair allows communication in one direction only.(Bidirectional communication can be achieved in a number of ways; the point is that a single invocation of a public-key encryption scheme forces ad is tinction between one user who acts as a receiver and other users who act as senders.)。In addition, a single instance of a (75) encryption scheme enables multiple senders to communicate privately with a single receiver,in contrast to the private-key case where a secret key shared between two parties enables private communication only between those two parties.
(1) A.main
B.same
C.public
D.secret
(2) A.stream
B.different
C.public
D.secret
(3) A.different
B.same
C.public
D.private
(4) A.different
B.same
C.public
D.private
(5) A.private-key
B.public-key
C.stream
D.Hash
查看答案
试题参考答案:D、C、B、A、B
试题9
蜜罐是一种在互联网上运行的计算机系统,是专门为吸引并诱骗那些试图非法闯入他人计算机系统的人而设计的。以下关于蜜罐的描述中,不正确的是( )。查看答案
试题参考答案:B
试题10
甲不但怀疑乙发给他的被人篡改,而且怀疑乙的公钥也是被人冒充的,为了消除甲的疑虑,甲和乙决定找一个双方都信任的第三方来签发数字证书,这个第三方为()
A、国际电信联盟电信标准分部(ITU-T)
B、国家安全局(NSA)
C、认证中心(CA)
D、国家标准化组织(ISO)
查看答案
试题参考答案:C
温馨提示:因考试政策、内容不断变化与调整,信管网提供的以上信息仅供参考,如有异议,请考生以权威部门公布的内容为准!
相关推荐