信管网每日一练
信息安全工程师 - 每日一练 导航

信息安全工程师每日一练试题(2025/6/18)

2025年06月19日来源:信管网 作者:cnitpm

信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6

往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html

信息安全工程师每日一练试题(2025/6/18)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/6/18

点击查看:更多信息安全工程师习题与指导

信息安全工程师每日一练试题内容(2025/6/18)

  • 试题1

    在交换机上配置安全访问控制时,哪一项措施属于第一级安全控制,用于在连接建立前过滤非法用户?
    A.设置SNMP访问的团体字符串
    B.配置ACL以过滤登录用户
    C.启用SSH服务以加密远程会话
    D.更改Console端口的默认登录密码

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/6/18

  • 试题2

    在UNIX/Linux操作系统中,口令信息保存在passwd和shadow文件中,这两个文件所在的目录是()
    A./bin
    B./lib
    C./etc
    D./home

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/6/18

  • 试题3

    基于统计的异常检测方法中,典型的主体特征不包括(    )
    A.系统的登录与注销时间
    B.资源被占用的时间以及处理机
    C.内存和外设的使用情况
    D.异常行为出现的频率

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/6/18

  • 试题4

    (  )能有效防止重放攻击。
    A.签名机制
    B.时间戳机制
    C.加密机制
    D.压缩机制

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/6/18

  • 试题5

    Kerberos是一种常用的身份认证协议,它采用的加密算法是()
    A、Elgamal
    B、DES
    C、MD5
    D、RSA

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/6/18

  • 试题6

    (   )是发生入侵后,提供紧急响应服务,例如关闭网络服务、中断网络连接、启动备份系统等
    A.数据采集模块
    B.入侵分析引擎模块
    C.应急处理模块
    D.管理配置模块

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/6/18

  • 试题7

    为了防止景点损坏网络设备,有效的措施不包括(  )
    A.人员服装采用不易产生静电的衣料,工作鞋选用高阻值材料制作
    B.控制机房温、湿度,使其保持在不易产生静电的范围内
    C.机房中使用的各种工作台、柜等,应选择产生静电小的材料
    D.在进行网络设备操作时,应戴防静电手套

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/6/18

  • 试题8

    Web应用防火墙的HTTP过滤的常见功能不包括(  )
    A.HTTP协议头各个字段的长度限制
    B.后缀名过滤
    C.Web服务器返回内容过滤
    D.IP地址白名单/黑名单过滤

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/6/18

  • 试题9

    The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. A block cipher is, in a sense, a modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of (71 )and a key, and output a block of ciphertext of the same size. Since messages are almost always longer than a single block, some method of knitting together successive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and must be carefully considered when using a block cipher in a cryptosystem.
    The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are( 72 )designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted). Despite its deprecation as an official standard, DES (especially its still-approved and much more secure triple-DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality. Many have been thoroughly broken. See Category: Block ciphers.
    Stream ciphers, in contrast to the ‘block’ type, create an arbitrarily long stream of key material, which is combined ( 73 )the plaintext bit-by-bit or character-by-character, somewhat like the one-time pad. In a stream cipher, the output( 74 )is created based on an internal state which changes as the cipher operates. That state change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a well-known, and widely used, stream cipher; see Category: Stream ciphers.
    Cryptographic hash functions (often called message digest functions) do not necessarily use keys, but are a related and important class of cryptographic algorithms. They take input data (often an entire message), and output a short fixed length hash, and do so as a one-way function. For good ones, ( 75 ) (two plaintexts which produce the same hash) are extremely difficult to find.
    Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key is used to authenticate the hash value on receipt. These block an attack against plain hash functions.
    (71)
    A.plaintext
    B.ciphertext
    C.data
    D.hash
    (72)
    A.stream cipher
    B.hash function
    C.Message authentication code
    D.Block cipher
    (73)
    A.of
    B.for
    C.with
    D.in
    (74)
    A.hash
    B.stream
    C.ciphertext
    D.plaintext
    (75)
    A.collisions
    B.image
    C.preimage
    D.solution

    查看答案

    试题参考答案:A、D、C、B、A

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/6/18

  • 试题10

    IOS平台通过什么机制来防止应用攻击?
    A.数据保护API
    B.数据的加密与保护机制
    C.地址空间布局随机化
    D.代码签名

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/6/18

温馨提示:因考试政策、内容不断变化与调整,信管网提供的以上信息仅供参考,如有异议,请考生以权威部门公布的内容为准!

分享至:

信管网 - 信息系统项目管理专业网站

下载APP-在线学习