信管网每日一练
信息安全工程师 - 每日一练 导航

信息安全工程师每日一练试题(2025/4/15)

2025年04月16日来源:信管网 作者:cnitpm

信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6

往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html

信息安全工程师每日一练试题(2025/4/15)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/4/15

点击查看:更多信息安全工程师习题与指导

信息安全工程师每日一练试题内容(2025/4/15)

  • 试题1

    在恶意代码查杀过程中,杀毒厂商主要依赖哪种方式分辨恶意代码?
    A. 实时行为监控
    B. 启发式扫描
    C. 特征码匹配
    D. 云端智能分析

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/4/15

  • 试题2

    Methods for (71)people differ significantly from those for authenticating machines and programs, and this is because of the major differences in the capabilities of people versus computers.Computers are great at doing(72) calculations quickly and correctly, and they have large memories into which they can store and later retrieve Gigabytes of information. Humans don't. So we need to use different methods to authenticate people. In particular, the(73) protocols we've already discussed are not well suited if the principal being authenticated is a person (with all the associated limitations).
    All approaches for human authentication rely on at least one of the followings:

    Something you know (eg. a password).This is the most common kind of authentication used for humans.We use passwords every day to access our systems. Unfortunately,something that you know can become something you just forgot. And if you write it down, then other people might find it.
    Something you(74)(eg.a smart card).This form of human authentication removes the problem of forgetting something you know, but some object now must be with you any time you want to be authenticated. And such an object might be stolen and then becomes something the attacker has.
    Something you are (eg. a fingerprint).Base authentication on something (75)to the principal being authenticated. It's much harder to lose a fingerprint than a wallet. Unfortunately,biometric sensors are fairly expensive and (at present) not very accurate.

    71
    A.authenticating
    B.authentication
    C.authorizing
    D.authorization
    72
    A.much
    B.huge
    C.large
    D.big
    73
    A.network
    B.cryptographic
    C.communication
    D.security
    74
    A.are
    B.have
    C.can
    D.owned
    75
    A.unique
    B.expensive
    C.important

    D.intrinsic

    查看答案

    试题参考答案:A、C、B、B、D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/4/15

  • 试题3

    利用时间来约束访问操作,在一些系统中为了增加访问控制的适应性,增加了时间因素的控制是(   )
    A.基于角色的访问控制规则
    B.基于时间的访问控制规则
    C.基于用户身份的访问控制规则
    D.基于地址的访问控制规则

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/4/15

  • 试题4

    攻击树的优点不包括( )
    A.能够进行费效分析或者概率分析
    B.能够建模非常复杂的攻击场景
    C.能够建模循环事件
    D.能够采取专家头脑风暴法,并且将这些意见融合到攻击树中去

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/4/15

  • 试题5

    已知DES算法的S盒如下:

    如果该S盒的输入110011,则其二进制输出为()
    A、0110
    B、1001
    C、0100
    D、0101

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/4/15

  • 试题6

    Oracle数据库的(   )机制用于保护敏感数据,防止未授权变更。
    A.数据备份
    B.数据库保险库
    C.审计日志
    D.透明数据加密

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/4/15

  • 试题7

    Hash 算法是指产生哈希值或杂凑值的计算方法。MD5算法是由Rivest 设计的Hash算法,该算法以512比特数据块为单位处理输入,产生(    )的哈希值。
    A.64比特
    B.128比特
    C.256比特
    D.512比特

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/4/15

  • 试题8

    PDRR模型是Protection、Detection、Recovery、Response。其中检测(Detection)的主要内容不包括(   )
    A.系统脆弱性检测
    B.数据完整性检测
    C.攻击性检测
    D.防火墙技术

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/4/15

  • 试题9

    从对信息的破坏性上看,网络攻击可以分为被动攻击和主动攻击,以下属于被动攻击的是()
    A.伪造
    B.流量分析
    C.拒绝服务
    D.中间人攻击

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/4/15

  • 试题10

    以下哪些不属于网络通信线路常见的物理安全威胁(  )
    A.网络通信线路被老鼠咬断
    B.网络通信线路受到电磁干扰不能正常传输信息
    C.网络通信线路泄漏电磁信号,导致通信线路上的传输信息泄密。
    D.网络通信线路受到网络攻击

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/4/15

温馨提示:因考试政策、内容不断变化与调整,信管网提供的以上信息仅供参考,如有异议,请考生以权威部门公布的内容为准!

分享至:

信管网 - 信息系统项目管理专业网站

下载APP-在线学习