2024年08月13日来源:信管网 作者:cnitpm
信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6
往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html
信息安全工程师每日一练试题(2024/8/12)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2024/8/12
点击查看:更多信息安全工程师习题与指导
信息安全工程师每日一练试题内容(2024/8/12)
试题1
为了增强DES算法的安全性,NIST于1999年发布了三重DES算法--TDEA。设DES Ek()和DES Dk()分别表示以k为密钥的DES算法的加密和解密过程,P和O分别表示明文和密文消息,则TDEA算法的加密过程正确的是( )。查看答案
试题参考答案:C
试题2
(1)is the science of hiding information. Whereas the goal of cryptography is to make data unreadable by a third party. the goal of steganography is to hide the data from a third party. In this article, I will discuss what steganography is, what purposes it serves, and will provide an example using available software.
There are a large number of steganographic (2)that most of us are familiar with (especially if you watch a lot of spy movies), ranging from invisible ink and microdots to secreting a hidden message in the second letter of each word of a large body of text and spread spectrum radio communication. With computers and networks, there are many other ways of hiding informations, such as:
Covert channels (c,g, Loki and some distributed denial-of-service tools use the Internet Control (3)Protocol, or ICMP, as the communication channel between the “bad guy”and a compromicyed system)
Hidden text within Web pages
Hiding files in “plain sight”(c,g. what better place to “hide”a file than with an important sounding name in the c:\winnt system32 directory)
Null ciphers(c,g, using the first letter of each word to form a hidden message in an otherwise innocuous text)
steganography today, however, is significantly more (4)than the example about suggest, allowing a user to hide large amounts of information within image and audio. These forms of steganography often are used in conjunction with cryptography so the information is double protected; first it is encrypted and then hidden so that an advertisement first. find the information ( an often difficult task in and of itself) and the decrypted it.
The simplest approach to hiding data within an image file is called (5)signature insertion. In this method, we can take the binary representation of the hidden data and the bit of each byte within the covert image. If we are using 24-bit color the amount and will be minimum and indiscriminate to the human eye.
(1)A、Cryptography
B、Geography
C、Stenography
D、Steganography
(2)A、methods
B、software
C、tools
D、services
(3)A、Member
B、Management
C、Message
D、Mail
(4)A、powerful
B、sophistication
C、advanced
D、easy
(5)A、least
B、most
C、much
D、less
查看答案
试题参考答案:D、A、C、B、A
试题3
防火墙的经典体系结构主要有三种,下图给出的是()体系结构。查看答案
试题参考答案:C
试题4
以下那个操作会妨碍口令认证的安全( )查看答案
试题参考答案:B
试题5
Snort是一款开源的网络入侵检测系统,能够执行实时流量分析和IP协议网络的数据包记录。以下不属于Snort主要配置模式的是()查看答案
试题参考答案:B
试题6
( )的技术特点是电子认证服务机构采用PKI技术、密码算法等提供数字证书申请、颁发、存档、查询、废止等服务,以及基于数字证书为电子活动提供可信身份、可信时间和可信行为综合服务。查看答案
试题参考答案:B
试题7
身份识别在信息安全领域有着广泛的应用,通过识别用户的生理特征来认证用户的身份是安全性很高的身份认证方法。如果把人体特征用于身份识别,则它应该具有不可复制的特点,必须具有()查看答案
试题参考答案:B
试题8
2021年6月10日,第十三届全国人民代表大会常务委员会第二十九次会议表决通过了《中华人民共和国数据安全法》,该法律自 ( ) 起施行。查看答案
试题参考答案:A
试题9
下列说法中,错误的是()
A、服务攻击是针对某种特定攻击的网络应用的攻击
B、主要的渗入威胁有特洛伊木马和陷阱
C、非服务攻击是针对网络层协议而进行的
D、对于在线业务系统的安全风险评估,应采用最小影响原则
查看答案
试题参考答案:B
试题10
无线局域网鉴别和保密体系WAPI是我国无线局域网安全强制性标准,以下关于WAP的描述,正确的是( )。查看答案
试题参考答案:D
温馨提示:因考试政策、内容不断变化与调整,信管网提供的以上信息仅供参考,如有异议,请考生以权威部门公布的内容为准!
相关推荐