信管网每日一练
信息安全工程师 - 每日一练 导航

信息安全工程师每日一练试题(2025/4/24)

2025年04月25日来源:信管网 作者:cnitpm

信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6

往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html

信息安全工程师每日一练试题(2025/4/24)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/4/24

点击查看:更多信息安全工程师习题与指导

信息安全工程师每日一练试题内容(2025/4/24)

  • 试题1

    在DES加密算法中,密钥长度和被加密的分组长度分别是()
    A、56位和64位
    B、56位和56位
    C、64位和64位
    D、64位和56位

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/4/24

  • 试题2

    (  )是用每一种病毒体含有的特定字节串对被检测的对象进行扫描。
    A.比较法
    B.搜索法
    C.特征字识别法
    D.分析法

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/4/24

  • 试题3

    下列那个选项与路由器的安全防范工作无关(  )
    A.路由器口令管理
    B.安装防火墙
    C.远程安全访问路由器
    D.路由器信息交换认证

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/4/24

  • 试题4

    远程访问路由器时,为了增强路由器安全管理,常用(  )替换Telnet。
    A.SSH
    B.MD5
    C.SSL
    D.Hash

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/4/24

  • 试题5

    网络攻击者常常采用(   )技术来逃避网络安全管理人员的追踪。
    A.数据加密
    B.数据销毁
    C.数据隐藏
    D.病毒更新

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/4/24

  • 试题6

    SM3密码杂凑算法的消息分组长度为(  )比特。
    A.64
    B.128
    C.512
    D.1024

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/4/24

  • 试题7

    在工业控制系统中,为确保资产安全,以下哪项措施是首要任务?
    A.立即安装最新的安全补丁
    B.建设工业控制系统资产清单并明确责任人
    C.对所有设备进行冗余配置
    D.部署防病毒软件

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/4/24

  • 试题8

    AES算法的特点不包含(  )
    A.保密的
    B.灵活性好
    C.免费的
    D.低内存需求

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/4/24

  • 试题9

    The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. A block cipher is, in a sense, a modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of (71 )and a key, and output a block of ciphertext of the same size. Since messages are almost always longer than a single block, some method of knitting together successive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and must be carefully considered when using a block cipher in a cryptosystem.
    The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are( 72 )designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted). Despite its deprecation as an official standard, DES (especially its still-approved and much more secure triple-DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality. Many have been thoroughly broken. See Category: Block ciphers.
    Stream ciphers, in contrast to the ‘block’ type, create an arbitrarily long stream of key material, which is combined ( 73 )the plaintext bit-by-bit or character-by-character, somewhat like the one-time pad. In a stream cipher, the output( 74 )is created based on an internal state which changes as the cipher operates. That state change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a well-known, and widely used, stream cipher; see Category: Stream ciphers.
    Cryptographic hash functions (often called message digest functions) do not necessarily use keys, but are a related and important class of cryptographic algorithms. They take input data (often an entire message), and output a short fixed length hash, and do so as a one-way function. For good ones, ( 75 ) (two plaintexts which produce the same hash) are extremely difficult to find.
    Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key is used to authenticate the hash value on receipt. These block an attack against plain hash functions.
    (71)
    A.plaintext
    B.ciphertext
    C.data
    D.hash
    (72)
    A.stream cipher
    B.hash function
    C.Message authentication code
    D.Block cipher
    (73)
    A.of
    B.for
    C.with
    D.in
    (74)
    A.hash
    B.stream
    C.ciphertext
    D.plaintext
    (75)
    A.collisions
    B.image
    C.preimage
    D.solution

    查看答案

    试题参考答案:A、D、C、B、A

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/4/24

  • 试题10

    为了防范内部威胁,工业企业的安全权限管理应遵循什么原则?
    A.最大特权原则
    B.权限平均分配原则
    C.最小特权原则
    D.无特权原则

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/4/24

温馨提示:因考试政策、内容不断变化与调整,信管网提供的以上信息仅供参考,如有异议,请考生以权威部门公布的内容为准!

分享至:

信管网 - 信息系统项目管理专业网站

下载APP-在线学习