信管网每日一练
信息安全工程师 - 每日一练 导航

信息安全工程师每日一练试题(2024/9/9)

2024年09月10日来源:信管网 作者:cnitpm

信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6

往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html

信息安全工程师每日一练试题(2024/9/9)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2024/9/9

点击查看:更多信息安全工程师习题与指导

信息安全工程师每日一练试题内容(2024/9/9)

  • 试题1

    关于宏病毒的传播机制,以下哪项描述是正确的?
    A.宏病毒会自动通过互联网搜索并感染其他计算机
    B.宏病毒在文件被关闭时自动复制并感染其他文件
    C.宏病毒的触发需要用户打开一个被感染的文件并允许宏程序执行
    D.宏病毒可以感染任何类型的文件,无论是否包含宏代码

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2024/9/9

  • 试题2

    以下哪项属于上下文因素(  )
    A.设备交互模式
    B.应用行为模式
    C.设备和网络模式
    D.左/右手

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2024/9/9

  • 试题3

    自然安全威胁不包含(   )
    A.地震
    B.火灾
    C.爆炸
    D.雷电

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2024/9/9

  • 试题4

    以下(   )情况最可能构成A6-安全配置错误。
    A.网站的登录表单未对输入进行验证,导致XSS攻击。
    B.网站的服务器配置了详细的错误信息,暴露了数据库查询语句。
    C.网站的数据库使用了弱密码,导致数据泄露。
    D.网站的API未实施HTTPS,数据在传输过程中被截获。

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2024/9/9

  • 试题5

    下图中,(  )的网络流量数据可以被网络流量采集设备获取到。

    A.服务器A
    B.服务器B
    C.服务器A和B都可以
    D.服务器A和B都不可以

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2024/9/9

  • 试题6

    访问控制机制由一组安全机制构成,可以抽象为一个简单的模型,模型中1、2、3分别为(   )

    A.访问控制数据库、参考监视器、审计库
    B.参考监视器、访问控制数据库、审计库
    C.参考监视器、审计库、访问控制数据库
    D.审计库、参考监视器、访问控制数据库

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2024/9/9

  • 试题7

    从网络安全的角度看,以下原则中不属于网络安全防护体系在设计和实现时需要遵循的基本原则的是(  )。
    A.最小权限原则
    B.纵深防御原则
    C.安全性与代价平衡原则
    D.Kerckhoffs原则

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2024/9/9

  • 试题8

    The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. A block cipher is, in a sense, a modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of (71 )and a key, and output a block of ciphertext of the same size. Since messages are almost always longer than a single block, some method of knitting together successive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and must be carefully considered when using a block cipher in a cryptosystem.
    The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are( 72 )designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted). Despite its deprecation as an official standard, DES (especially its still-approved and much more secure triple-DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality. Many have been thoroughly broken. See Category: Block ciphers.
    Stream ciphers, in contrast to the ‘block’ type, create an arbitrarily long stream of key material, which is combined ( 73 )the plaintext bit-by-bit or character-by-character, somewhat like the one-time pad. In a stream cipher, the output( 74 )is created based on an internal state which changes as the cipher operates. That state change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a well-known, and widely used, stream cipher; see Category: Stream ciphers.
    Cryptographic hash functions (often called message digest functions) do not necessarily use keys, but are a related and important class of cryptographic algorithms. They take input data (often an entire message), and output a short fixed length hash, and do so as a one-way function. For good ones, ( 75 ) (two plaintexts which produce the same hash) are extremely difficult to find.
    Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key is used to authenticate the hash value on receipt. These block an attack against plain hash functions.
    (71)
    A.plaintext
    B.ciphertext
    C.data
    D.hash
    (72)
    A.stream cipher
    B.hash function
    C.Message authentication code
    D.Block cipher
    (73)
    A.of
    B.for
    C.with
    D.in
    (74)
    A.hash
    B.stream
    C.ciphertext
    D.plaintext
    (75)
    A.collisions
    B.image
    C.preimage
    D.solution

    查看答案

    试题参考答案:A、D、C、B、A

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2024/9/9

  • 试题9

    特权的分配原则是(   )
    A.按需使用原则
    B.最大特权原则
    C.管理员授权原则
    D.谁用谁负责原则

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2024/9/9

  • 试题10

    在Oracle数据库系统中,为了提高数据传输的安全性,防止数据在传输过程中被窃听或篡改,推荐使用(   )加密机制。
    A.IPsec
    B.SSH
    C.SSL/TLS
    D.WEP

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2024/9/9

温馨提示:因考试政策、内容不断变化与调整,信管网提供的以上信息仅供参考,如有异议,请考生以权威部门公布的内容为准!

分享至:

信管网 - 信息系统项目管理专业网站

下载APP-在线学习