2025年01月12日来源:信管网 作者:cnitpm
信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6
往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html
信息安全工程师每日一练试题(2025/1/11)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/1/11
点击查看:更多信息安全工程师习题与指导
信息安全工程师每日一练试题内容(2025/1/11)
试题1
蜜罐是一种在互联网上运行的计算机系统,是专门为吸引并诱骗那些试图非法闯入他人计算机系统的人而设计的。以下关于蜜罐的描述中,不正确的是( )。查看答案
试题参考答案:B
试题2
攻击者常用来隐藏真实IP地址的方法不包括( )查看答案
试题参考答案:C
试题3
关于BLP特性的描述,正确的是( )查看答案
试题参考答案:C
试题4
X.509数字证书的内容不包括()。查看答案
试题参考答案:C
试题5
在《计算机场地通用规范中》,低压配电间、空调机室、发电机室属于( )查看答案
试题参考答案:B
试题6
端口扫描的目的是找出目标系统上提供的服务列表。根据扫描利用的技术不同,端口扫描可以分为完全连接扫描、半连接扫描、SYN扫描、FIN扫描、隐蔽扫描、ACK扫描、NULL扫描等类型。其中,在源主机和目的主机的三次握手连接过程中,只完成前两次,不建立一次完整连接的扫描属于( )查看答案
试题参考答案:B
试题7
Perhaps the most obvious difference between private-key and public-key encryption is that the former assumes complete secrecy of all cry to graphic keys, whereas the latter requires secrecy for only the private key.Although this may seem like a minor distinction ,the ramifications are huge: in the private-key setting the communicating parties must somehow be able to share the (71) key without allowing any third party to learn it, whereas in the public-key setting the (72) key can be sent from one party to the other over a public channel without compromising security.For parties shouting across a room or, more realistically , communicating over a public network like a phone line or then ternet, public-key encryption is the only option.
Another important distinction is that private-key encryption sch emesuse the (73) key for both encryption and decryption, whereas public key encryption schemes use (74) keys for each operation.That is public-key encryption is inherently as ymmetri C.This asymmetry in the public-key setting means that the roles of sender and receiver are not interchangeable as they are in the private-key setting; a single key-pair allows communication in one direction only.(Bidirectional communication can be achieved in a number of ways; the point is that a single invocation of a public-key encryption scheme forces ad is tinction between one user who acts as a receiver and other users who act as senders.)。In addition, a single instance of a (75) encryption scheme enables multiple senders to communicate privately with a single receiver,in contrast to the private-key case where a secret key shared between two parties enables private communication only between those two parties.
(1) A.main
B.same
C.public
D.secret
(2) A.stream
B.different
C.public
D.secret
(3) A.different
B.same
C.public
D.private
(4) A.different
B.same
C.public
D.private
(5) A.private-key
B.public-key
C.stream
D.Hash
查看答案
试题参考答案:D、C、B、A、B
试题8
为了防范内部威胁,工业企业的安全权限管理应遵循什么原则?查看答案
试题参考答案:C
试题9
关于RAS算法描述错误的是( )查看答案
试题参考答案:A
试题10
S/key口令是一种一次性口令生成方案,它可以对抗( )。查看答案
试题参考答案:C
温馨提示:因考试政策、内容不断变化与调整,信管网提供的以上信息仅供参考,如有异议,请考生以权威部门公布的内容为准!
相关推荐