2025年02月27日来源:信管网 作者:cnitpm
信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6
往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html
信息安全工程师每日一练试题(2025/2/26)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/2/26
点击查看:更多信息安全工程师习题与指导
信息安全工程师每日一练试题内容(2025/2/26)
试题1
PDRR模型是Protection、Detection、Recovery、Response。其中恢复(Recovery)的主要内容不包括( )查看答案
试题参考答案:B
试题2
以下( )是对基于异常事件访问控制规则的应用。查看答案
试题参考答案:C
试题3
以下关于认证技术的叙述中,错误的是()
A、指纹识别技术的利用可以分为验证和识别
B、数字签名是十六进制的字符串
C、身份认证是用来对信息系统中实体的合法性进行验证的方法
D、消息认证能够确定接收方收到的消息是否被篡改过
查看答案
试题参考答案:B
试题4
Perhaps the most obvious difference between private-key and public-key encryption is that the former assumes complete secrecy of all cry to graphic keys, whereas the latter requires secrecy for only the private key.Although this may seem like a minor distinction ,the ramifications are huge: in the private-key setting the communicating parties must somehow be able to share the (71) key without allowing any third party to learn it, whereas in the public-key setting the (72) key can be sent from one party to the other over a public channel without compromising security.For parties shouting across a room or, more realistically , communicating over a public network like a phone line or then ternet, public-key encryption is the only option.
Another important distinction is that private-key encryption sch emesuse the (73) key for both encryption and decryption, whereas public key encryption schemes use (74) keys for each operation.That is public-key encryption is inherently as ymmetri C.This asymmetry in the public-key setting means that the roles of sender and receiver are not interchangeable as they are in the private-key setting; a single key-pair allows communication in one direction only.(Bidirectional communication can be achieved in a number of ways; the point is that a single invocation of a public-key encryption scheme forces ad is tinction between one user who acts as a receiver and other users who act as senders.)。In addition, a single instance of a (75) encryption scheme enables multiple senders to communicate privately with a single receiver,in contrast to the private-key case where a secret key shared between two parties enables private communication only between those two parties.
(1) A.main
B.same
C.public
D.secret
(2) A.stream
B.different
C.public
D.secret
(3) A.different
B.same
C.public
D.private
(4) A.different
B.same
C.public
D.private
(5) A.private-key
B.public-key
C.stream
D.Hash
查看答案
试题参考答案:D、C、B、A、B
试题5
需要被证实的实体是( ),负责检查确认声称者的实体是( )查看答案
试题参考答案:A
试题6
关于密码的分类,描述错误的是( )查看答案
试题参考答案:C
试题7
阿里巴巴大数据安全管理理念的核心是( )查看答案
试题参考答案:B
试题8
等保2.0的主要变化不包括( )查看答案
试题参考答案:B
试题9
源主机A向目标主机B发送FIN数据包,然后查看反馈信息。如果端口返回RESET信息,查看答案
试题参考答案:A
试题10
Apache Web安全增强措施中,为了隐藏Apache软件的版本号以防止潜在的安全威胁,应该修改哪个配置文件并设置哪些参数?查看答案
试题参考答案:C
温馨提示:因考试政策、内容不断变化与调整,信管网提供的以上信息仅供参考,如有异议,请考生以权威部门公布的内容为准!
相关推荐