信管网每日一练
信息安全工程师 - 每日一练 导航

信息安全工程师每日一练试题(2025/6/20)

2025年06月21日来源:信管网 作者:cnitpm

信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6

往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html

信息安全工程师每日一练试题(2025/6/20)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/6/20

点击查看:更多信息安全工程师习题与指导

信息安全工程师每日一练试题内容(2025/6/20)

  • 试题1

    网络信息系统安全等级测评过程包括测评准备活动、(   )、现场测评活动和报告编制活动四个基本测评活动。
    A.计划编制活动
    B.资源分配活动
    C.方案编制活动
    D.技术标准制定活动

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/6/20

  • 试题2

    (1)is the science of hiding information. Whereas the goal of cryptography is to make data unreadable by a third party. the goal of steganography is to hide the data from a third party. In this article, I will discuss what steganography is, what purposes it serves, and will provide an example using available software.
    There are a large number of steganographic (2)that most of us are familiar with (especially if you watch a lot of spy movies), ranging from invisible ink and microdots to secreting a hidden message in the second letter of each word of a large body of text and spread spectrum radio communication. With computers and networks, there are many other ways of hiding informations, such as:
    Covert channels (c,g, Loki and some distributed denial-of-service tools use the Internet Control (3)Protocol, or ICMP, as the communication channel between the “bad guy”and a compromicyed system)
    Hidden text within Web pages
    Hiding files in “plain sight”(c,g. what better place to “hide”a file than with an important sounding name in the c:\winnt system32 directory)
    Null ciphers(c,g, using the first letter of each word to form a hidden message in an otherwise innocuous text)
    steganography today, however, is significantly more (4)than the example about suggest, allowing a user to hide large amounts of information within image and audio. These forms of steganography often are used in conjunction with cryptography so the information is double protected; first it is encrypted and then hidden so that an advertisement first. find the information ( an often difficult task in and of itself) and the decrypted it.
    The simplest approach to hiding data within an image file is called (5)signature insertion. In this method, we can take the binary representation of the hidden data and the bit of each byte within the covert image. If we are using 24-bit color the amount and will be minimum and indiscriminate to the human eye.
    (1)A、Cryptography
    B、Geography
    C、Stenography
    D、Steganography
    (2)A、methods
    B、software
    C、tools
    D、services
    (3)A、Member
    B、Management
    C、Message
    D、Mail
    (4)A、powerful
    B、sophistication
    C、advanced
    D、easy
    (5)A、least
    B、most
    C、much
    D、less

    查看答案

    试题参考答案:D、A、C、B、A

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/6/20

  • 试题3

    (    )属于默认设置访问,要求物理上访问网络设备。
    A.Console Port
    B.AUX Port
    C.VTY
    D.HTTP

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/6/20

  • 试题4

    攻击树方法可以被(  )用来进行渗透测试,同时也可以被(  )用来研究防御机制。
    A.Red Team     Blue Team
    B.Blue Team     Red Team
    C.Offense team     Defense team
    D.Defense team     Offense team

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/6/20

  • 试题5

    (    )是指密码分析者仅知道当前密钥下的一些明文及所对应的密文。
    A.选择密文攻击
    B.已知明文攻击
    C.选择明文攻击
    D.密文验证攻击

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/6/20

  • 试题6

    在网络安全风险评估中,(   )是指网络系统使用单位委托具有风险评估能力的专业评估机构实施的评估活动
    A.资产评估
    B.自评估
    C.检查评估
    D.委托评估

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/6/20

  • 试题7

    关于基于规则的误用检测方法,描述不正确的是(    )
    A.该方法的优点是检测起来比较简单。
    B.该方法的缺点是检测受到规则库限制,无法发现新的攻击,并且容易受干扰。
    C.大部分IDS采用的是基于规则的误用检测方法。
    D.Suricata是典型的基于规则的误用检测方法的应用实例。

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/6/20

  • 试题8

    计算机病毒的生命周期一般包括()四个阶段
    A.开发阶段、传播阶段、发现阶段、清除阶段
    B.开发阶段、潜伏阶段、传播阶段、清除阶段
    C.潜伏阶段、传播阶段、发现阶段、清除阶段
    D.潜伏阶段、传播阶段、触发阶段、发作阶段

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/6/20

  • 试题9

    下面关于跨站攻击描述不正确的是()
    A.跨站脚本攻击指的是恶意攻击者向Web页面里插入恶意的Html代码
    B.跨站脚本攻击简称XSS
    C.跨站脚本攻击也可称作CSS
    D.跨站脚本攻击是主动攻击

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/6/20

  • 试题10

    安全电子交易协议SET是有VISA和MasterCard两大信用卡组织联合开发的电子商务安全协议。以下关于SET的叙述中,正确的是()
    A、SET是一种基于流密码的协议
    B、SET不需要可信的第三方认证中心的参与
    C、SET要实现的主要目标包括保障付款安全,确定应用的互通性和达到全球市场的可接受性
    D、SET通过向电子商务各参与方发放验证码来确认各方的身份,保证网上支付的安全性

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/6/20

温馨提示:因考试政策、内容不断变化与调整,信管网提供的以上信息仅供参考,如有异议,请考生以权威部门公布的内容为准!

分享至:

信管网 - 信息系统项目管理专业网站

下载APP-在线学习