信管网每日一练
信息系统管理工程师 - 每日一练 导航

信息系统管理工程师每日一练试题(2026/2/17)

2026年02月20日来源:信管网 作者:cnitpm

信息系统管理工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=30

往期信息系统管理工程师每日一练试题汇总:www.cnitpm.com/class/27/e30_1.html

信息系统管理工程师每日一练试题(2026/2/17)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=30&day=2026/2/17

点击查看:更多信息系统管理工程师习题与指导

信息系统管理工程师每日一练试题内容(2026/2/17)

  • 试题1

    知识螺旋(SECI)模型将知识创新活动分为( )4种模式。
    A. 社会化、整合、共享化、同化
    B. 外化、内化、共享化、同化
    C. 整合、共享化、外化、内化
    D. 社会化、整合、外化、内化

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=30&day=2026/2/17

  • 试题2

    《数据安全法》延续了《网络安全法》生效以来的“( )”的监管体系,通过多方共同参与实现各地方、各部门对工作集中收集和产生数据的安全管理。
    A. 一轴两翼多级
    B. 三位一体
    C. 三级四层
    D. 双轨分级

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=30&day=2026/2/17

  • 试题3

    数据总结的主要目的是( )
    A.找出数据库中隐藏的关联网
    B.对数据进行浓缩,给出其总体综合描述
    C.将数据分派到不同的组中,并预测新数据的归属
    D.检测数据库中的异常记录

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=30&day=2026/2/17

  • 试题4

    数据战略规划的内容不包括( )
    A.识别利益相关者
    B.数据战略制定
    C.数据战略修订
    D.建立保障计划

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=30&day=2026/2/17

  • 试题5

    Murphy's Law suggests, "If anything can go wrong, it will." Murphy has motivated numerous pearls of wisdom about projects; machines, people, and why things go wrong. A project is a [temporary] sequence of unique, complex, and connected ( 1 ) having one goal or purpose and that must be completed by a specific time, within budget, and according to ( 2 ).Project management is the ( 3 ) of scoping, planning, staffing, organizing, directing, and controlling the development of an acceptable information system at a minimum cost within a specified time frame. Project management is a cross life cycle activity because it overlaps all phases of any systems development methodology.
    For any systems development project, effective project management is necessary to ensure that the project meets the deadline, is developed within a (an) ( 4 ) budget, and fulfills customer expectations and specifications.
    Corporate rightsizing has changed the structure and culture of most organizations, and hence, project management. More flexible and temporary interdepartmental(不同部门间)teams that are given greater responsibility and authority for the success of organizations have replaced rigid hierarchical command structures and permanent teams. Contemporary system development methodologies depend on having teams that include both technical and nontechnical users, managers, and information technologists all directed to the project goal. These ( 5 ) teams require leadership and project management.
    (1) A.activities
    B.tasks
    C.services
    D.software
    (2)A.document
    B.order
    C.specification
    D.authority
    (3)A.process
    B.activity
    C.step
    D.task
    (4) A.predefined
    B.acceptable
    C.rigid
    D.Strict
    (5)A.invariable
    B.fixed
    C.permanent
    D.dynamic

    查看答案

    试题参考答案:A、C、A、B、D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=30&day=2026/2/17

  • 试题6

    在应用系统的安全管理中,漏洞管理的核心目的是( )
    A.提高系统性能
    B.保障系统安全性和稳定性
    C.优化用户体验
    D.降低运维成本

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=30&day=2026/2/17

  • 试题7

    在Windows操作环境中,采用( ) 命令来查看本机IP 地址及网卡MAC 地址。
    A.ping
    B.tracert
    C.ipconfig

    D.nslookup

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=30&day=2026/2/17

  • 试题8

    Models drawn by the system analysts during the process of the structured analysis are  ( ) .
    A.PERTs
    B.ERDs
    C.UMLs
    D.DFDs

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=30&day=2026/2/17

  • 试题9

    WebSQL is a SQL­like (1)language for extracting information from the web.Its capabilities for performing navigation of web (2)make it a useful tool for automating several web­relate dtasks that require the systematic processing of either all the links in a (3), all the pages that can be reached from a given URL through (4)that match a pattern, or a combination of both.WebSQL also provides transparent access to index servers that can be queried via the Common(5)Interface.
    (1)A.query
    B.transaction
    C.communication
    D.programming
    (2)A.browsers
    B.servers
    C.hypertexts
    D.clients
    (3)A.hypertext
    B.page
    C.protocol
    D.operation
    (4)A.paths
    B.chips
    C.tools
    D.directories
    (5)A.Router
    B.Device
    C.Computer
    D.Gateway

    查看答案

    试题参考答案:A、C、B、A、D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=30&day=2026/2/17

  • 试题10

    关于应用漏洞管理的描述,不正确的是( )
    A.需确保所有漏洞都能够被发现,并得到有效处理。
    B.采用安全扫描工具对系统进行定期扫描,发现潜在的漏洞和安全问题,及时进行处理。
    C.定期检查系统补丁的更新情况,及时更新补丁以修补已知的漏洞和安全问题。
    D.明确漏洞的归属部门,防止出现漏洞无人认领的局面。

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=30&day=2026/2/17

温馨提示:因考试政策、内容不断变化与调整,信管网提供的以上信息仅供参考,如有异议,请考生以权威部门公布的内容为准!

分享至:

信管网 - 信息系统项目管理专业网站

下载APP-在线学习